US20070115127A1 - RFID Switching - Google Patents
RFID Switching Download PDFInfo
- Publication number
- US20070115127A1 US20070115127A1 US11/622,827 US62282707A US2007115127A1 US 20070115127 A1 US20070115127 A1 US 20070115127A1 US 62282707 A US62282707 A US 62282707A US 2007115127 A1 US2007115127 A1 US 2007115127A1
- Authority
- US
- United States
- Prior art keywords
- rfid tag
- enclosure
- disabling
- tag
- state
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/08—Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
- G06Q10/087—Inventory or stock management, e.g. order filling, procurement or balancing against orders
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/28—Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence
Definitions
- the present disclosure is generally related to monitoring and tracking objects, and more particularly, to systems, devices and methods for monitoring and tracking objects in an enclosure using radio frequency identification (RFID) technology.
- RFID radio frequency identification
- Shadowboxing may also be implemented in accord with such procedures.
- Shadowboxing refers to an outline of indirect material (e.g., objects such as wrenches, gauges, safety glasses, tools, pencils, etc.) in or on surfaces located within enclosures.
- the outline (or shadowbox) may be further distinguished from the surrounding surfaces by possessing a different color, different material, and/or different topology (e.g., such as a recess in a particular material).
- other methods to provide distinction may be used (e.g., pegs or protrusions providing an outline of an object) alone or in combination with the aforementioned distinguishing features.
- pegs or protrusions providing an outline of an object
- the outline provides an immediate visual indication to inspection personnel that the object is missing, and thus other procedures are invoked to track the missing object to prevent possible damage to equipment or harm to personnel.
- the quantity of such enclosures that are to be checked one or more times throughout the day can consume a considerable amount of man-hours.
- the present disclosure provides various method and apparatus embodiments involving RFID switching.
- One method embodiment includes receiving an excitation signal at a switch associated with a radio frequency identification (RFID) tag and a disabling material, and changing a state of the RFID tag with the switch based on proximity of the disabling material to the RFID tag.
- RFID radio frequency identification
- Another method embodiment comprises sending an excitation signal to a switch associated with a radio frequency identification (RFID) tag and a disabling material, and receiving a response to the excitation signal based on a separation distance between the disabling material and the RFID tag, the separation distance based on a change in the switch.
- RFID radio frequency identification
- One apparatus embodiment comprises a first member comprising a disabling material, a second member in moveable relationship with respect to the first member, and a multi-state radio frequency identification (RFID) tag coupled to the second member that changes state based on a separation distance between the RFID tag and the disabling material.
- RFID radio frequency identification
- FIGS. 1A-1B are elevation views that illustrate an embodiment of an object tracking system.
- FIG. 2A is an elevation view that illustrates another embodiment of an object tracking system.
- FIG. 2B is a plan view of the object tracking system shown in FIG. 2A with an enclosure shown having an opened drawer.
- FIG. 3 is an elevation view of another embodiment of an object tracking system that combines features of the object tracking system embodiments shown in FIGS. 1A-2B .
- FIGS. 4A-4B are schematic diagrams that show one embodiment of a radio frequency identification (RFID) switch that can be used in cooperation with the object tracking systems shown in FIGS. 1A-3
- RFID radio frequency identification
- FIGS. 5-6 are block diagrams of embodiments of a computing system and components therein of the object tracking systems shown in FIGS. 1A-3 .
- FIG. 7 is a flow diagram that illustrates an authentication method embodiment of the object tracking systems shown in FIGS. 1A-3 .
- FIG. 8 is a flow diagram that illustrates a scanning method embodiment of the object tracking systems shown in FIGS. 1A-3 .
- FIG. 9 is a flow diagram that illustrates an object tracking method embodiment corresponding to the object tracking systems shown in FIGS. 1A-3 .
- RFID radio frequency identification
- RFID refers to technology that uses radio waves to automatically identify people or objects.
- An object refers to indirect material to be used in the support of operations of a facility, work environment, or the like, and includes pencils, tools, safety glasses, gauges, wrenches, etc.), as well as direct material (e.g., other inventory objects, such as files, jewelry, finished product, etc.).
- An object can be tagged and optionally shadowboxed and stored within an enclosure.
- An enclosure refers to an apparatus or environment that stores one or more objects, and which is configured to enable access to one or more objects through openings that are removably blocked by one or more access members (e.g., one or more cabinet doors, drawers, panels, etc.) that can be closed and opened.
- access members e.g., one or more cabinet doors, drawers, panels, etc.
- enclosures include drawer-type cabinets, cabinets with shelving, etc., or a combination of the same, or apparatuses having similar functionality.
- Certain embodiments of the object tracking systems comprise a computing system that provides authentication functionality, whereby access to one or more objects in an enclosure is permitted when a user seeking access is authenticated (e.g., confirmed that he or she is authorized to access the interior of the enclosure). For instance, in one embodiment, a user enters his or her identification information (e.g., by manual entry, through bar code or magnetic strip scanning, etc.) via an interface (e.g, touch-screen, graphical user interface (GUI), keypad entry interface, magnetic card reader, bar scanner, biometric scan, etc.).
- GUI graphical user interface
- the computing system in one embodiment through comparison of the received identification information with authorized user information in a database or other data structure, determines if the user is authorized to access the interior of the enclosure. Upon successful authentication, access to the interior of the enclosure by the user is enabled, as described further below.
- each object stored in an enclosure is associated with a corresponding radio frequency identification (RFID) tag.
- RFID radio frequency identification
- each object is associated with a switch, the switch having a tag affixed thereto.
- the switch When the switch is loaded with the object, the tag possesses one state.
- the tag When the object is removed from the enclosure, the tag possesses another state.
- Each state is treated differently by the computing system to enable the monitoring of when an object is removed and when an object is returned or otherwise inserted into the enclosure, as described below.
- each RFID tag is attached to, or integrated into, each object in an enclosure.
- a combination of these methods for associating RFID tags with objects may be used.
- the initial association of each RFID tag with a particular object can be implemented through a user interactive start-up or configuration procedure implemented at any point in time.
- an RFID tag stores an identifier on a microchip that is coupled to an antenna, the identifier associated (e.g., through the association process mentioned above) with an object in the enclosure.
- the microchip and the antenna comprise what is often referred to as an RFID transponder or RFID tag.
- the RFID tag is responsive to an excitation signal from the computing system, the latter which includes one or more readers, with each reader having receiver/transmitter (or transceiver) functionality as described further below.
- the RFID tag in response to being activated or awakened by the excitation signal from the computing system (e.g., the reader of the computing system), the RFID tag transmits a response signal comprising the identification information to the reader.
- the reader converts the radio waves provided from the RFID tag into information that can be used to detect the presence or absence of an object associated with a particular RFID tag.
- the transmission of the identification information from the RFID tag may be implemented in some embodiments by generating an “original” signal (e.g., separate from and independent of the received excitation signal) in response to excitation by the signal from the reader.
- the transmission may be implemented by reflecting back a portion of the excitation signal from the reader in a process referred to as backscatter.
- the RFID tags included within the scope of this disclosure include active, passive, or semi-passive tags, and in some embodiments, a combination of one or more of these types of RFID tags may be used in a given enclosure.
- one object tracking method embodiment can generally be described as follows.
- the computing system continually emits excitation signals to the interior of the enclosure in an effort to track which objects currently reside within the enclosure.
- excitation signals to the interior for reception by the RFID tags, the receiving and reading of the information corresponding to the response signals from the RFID tags, and the determination as to which tags have been removed or returned (a hence which objects have been removed or returned) is also referred to herein as a scan, scanning, or a scanning process or the like.
- the computing system When a user seeks to access the interior space of the enclosure (e.g., to return an object, or remove an object), the user enters identification information at an interface of the enclosure, which is received and processed by the computing system. If the user is not authorized to access the interior space of the enclosure, the user is denied access (e.g., the access member(s) removably blocking access to the interior of the enclosure remain locked). If the user is authorized, the computing system disengages a locking mechanism coupled to the access member(s) of an entrance or access point of the enclosure to enable access to the interior space of the enclosure, and the computing system in one embodiment temporarily ceases the scanning process. In one embodiment, the temporary cessation of the scan process occurs responsive to authentication (before disengagement of the locking mechanism).
- the temporary cessation of the scan process can occur responsive to the disengagement of the locking mechanism, the opening of an access member, or a combination of two or more of the above described mechanisms in a redundant fashion (e.g., if the scan process does not cease after authentication, the disengagement and/or the opening of the access member acts as a fails-safe mechanism to ensure the scanning process ceases).
- Such removal of the tool either removes the associated RFID tag (assuming coupling or integration of the RFID tag with or within the tool), or the removal of the tool changes the status or state of an RFID tag, for instance by closing of a metallic switch upon the RFID tag to disable the ability of the computing system to properly read the RFID tag.
- a sensor senses that the access member is closed and communicates (e.g., by actively sending or via polling mechanisms implemented by the computing system) this change in access member status to the computing system, which responsively resumes the scan process.
- the re-engagement (automatic upon closure, or in some embodiments, controlled by the computing system responsive to receipt of status of door opening from the sensor) of the locking mechanism is sensed or otherwise communicated to the computing system, and the computing system resumes the scanning process responsive to re-engagement.
- the computing system determines that an object listed in its corresponding database is not detected during the scanning process (e.g., either because the tag is physically removed from the enclosure or the tag status has changed to a non-readable state in a switch embodiment).
- the computing system e.g., software in the computing system
- the computing system provides feedback of that missing tool to a user, operator, or other device (e.g., networked computer used by a tool manager or quality assurance personnel responsible for monitoring tool inventory and/or compliance with safety protocols among one or more enclosures).
- a user e.g., networked computer used by a tool manager or quality assurance personnel responsible for monitoring tool inventory and/or compliance with safety protocols among one or more enclosures.
- Such feedback may be implemented via one or more of a local and/or remote screen display, warning lights, sound, among other mechanisms described below.
- FIGS. 1A and 1B shown is one embodiment of an object tracking system 100 a that comprises an enclosure 102 embodied as a cabinet, and a cap 114 that rests on top of, or is otherwise integrated with, the enclosure 102 .
- the cap 114 can be located elsewhere, such as on the side of the enclosure 102 , below the enclosure 102 , or remotely from the enclosure 102 .
- the enclosure 102 comprises an access mechanism 104 from which a user gains access to the interior of the enclosure 102 .
- the access mechanism 104 may comprise a handle, knob, latch, or other suitable mechanism for permitting entry by a user into the interior of the enclosure 102 .
- the enclosure 102 further comprises two access members also referred to herein as locking doors 106 and 108 that, upon authorized (e.g., authenticated) entry, a user may swing open to gain access to objects within.
- locking door 106 is opened first before locking door 108 can be opened.
- the enclosure 102 also includes a sensor 107 (e.g., electromechanical sensor, photo-diode, etc.) configured to detect when the locking door 108 is closed.
- a sensor 107 e.g., electromechanical sensor, photo-diode, etc.
- One having ordinary skill in the art can understand in the context of this disclosure that the location or type of sensor 107 can vary, and in some embodiments, can be integrated within other components, such as within access mechanism 104 or electro-magnetic lock 110 .
- sensor 107 can actively communicate the status (e.g., of door closing) to the computing system 200 a , or in some embodiments, can be polled by the computing system 200 a , among other mechanisms including a combination of the mechanisms described above or other mechanisms for detecting and communicating the status.
- each locking door 106 and 108 may be configured with an access mechanism 104 to enable independent entry of separate (or shared) interior spaces within enclosure 102 . Although illustrated (e.g., FIG.
- the locking doors can be replaced with other suitable access member(s), such as lockable sliding doors (e.g., on a rail, etc.), roll-up single door, similar to a garage door, among others.
- suitable access member(s) such as lockable sliding doors (e.g., on a rail, etc.), roll-up single door, similar to a garage door, among others.
- access is permitted or denied through use of an electro-magnetic lock 110 , which is fixedly coupled to the enclosure 102 .
- electro-magnetic lock 110 comprises a first portion 110 b coupled to the locking door 106 and a second portion 110 a coupled to the cap 114 of the enclosure 102 .
- the electro-magnetic lock 110 can be coupled anywhere on the enclosure 102 so long as the electro-magnetic lock 110 engages and disengages the locking door 106 in a manner that controllably permits or denies access to the interior of the enclosure 102 .
- the electro-magnetic lock 110 when energized by the computing system 200 a (e.g., via self-contained power in one embodiment, or in some embodiments, when power is supplied remotely and switched by the computing system 200 a ), denies entry by prohibiting the locking door 106 (and hence, in one embodiment by virtue of overlapping doors, locking door 108 ) from being opened. When de-energized, the electro-magnetic lock 110 permits opening of the locking door 106 . Upon closure of the doors 106 and 108 , the electro-magnetic lock 110 automatically re-engages and the sensor 107 senses the closure and communicates (e.g., actively or passively) the status to the computing system 200 a to subsequently enable resumption of the scanning process.
- the re-engagement of electro-magnetic lock 110 is communicated to (or otherwise sensed by, such as through the use of a current sensor) the computing system 200 a , which responsively resumes the scan process.
- the electro-magnetic lock 110 is re-engaged in response to control signals from the computing system 200 a (e.g., the latter prompted in response to receiving the status of door closing from the sensor 107 ).
- control signals from the computing system 200 a e.g., the latter prompted in response to receiving the status of door closing from the sensor 107 .
- the cap 114 is located, in one embodiment, at the top of the enclosure 102 .
- the cap 114 houses a computing system 200 a , which is symbolically represented in phantom with a dashed box.
- the computing system 200 a controls the authentication process used to enable entry or denial of access to the interior of the enclosure 102 , while also providing scanning functionality, among other functions.
- One having ordinary skill in the art can appreciate that the location of the cap 114 (and hence computing system 200 a ) may be elsewhere, for instance at the side of the enclosure 102 or located remotely.
- GUI 130 graphics user interface 130 .
- the GUI 130 may use light-emitting diode (LED), liquid-crystal diode (LCD), or plasma technology, among others.
- the GUI 130 comprises a touch-screen that enables a user to enter a password and/or user identification by selecting his or her name on the screen and/or entering via alphanumeric button icons.
- the user interface 112 may include authentication procedures used in lieu of or in addition to the touch-screen GUI 130 , including one or more of the following: a biometric scanner, bar code reader (e.g., for use with scannable employee identification tags comprising bar codes), magnetic card reader, electro-magnetic pushbuttons in cooperation with a display or without a display, key entry, among other mechanisms.
- a biometric scanner e.g., for use with scannable employee identification tags comprising bar codes
- magnetic card reader e.g., for use with scannable employee identification tags comprising bar codes
- electro-magnetic pushbuttons in cooperation with a display or without a display, key entry, among other mechanisms.
- FIG. 1B shows the enclosure 102 after the locking doors 106 and 108 have been opened by an authenticated user.
- the interior space of the enclosure 102 comprises four transmit/receive (T/R) antennas 116 a , 116 b , 118 a , and 118 b associated with one or more readers (not shown).
- T/R transmit/receive
- two of the T/R antennas 116 a , 116 b are attached to opposing ends of the interior sides of the enclosure 102
- two of the T/R antennas 118 a , 118 b are attached to the interior top portion of the enclosure 102 .
- antennas may be used in different locations and/or different configurations (e.g., different configurations such as separate transmit and receive antennas for each reader, among others). For instance, depending on many factors including the size of the enclosure, density of internal structures, material of internal structures located within an enclosure, quantity of objects, a single T/R antenna may be used with one reader.
- the shelving structure 130 may be configured in a variety of ways, such as with easily removable shelves 132 (e.g., snap-on versus fixably attached as with screws or bolts or other fasteners), slidable shelves that are extended and retracted using a rail assembly or other mechanism), fixably attached shelves, or a combination of these or others structures.
- the entirety of the shelving structure 130 is comprised of a non-metallic material (e.g., plexiglass, plastic, etc.), with shelves 132 comprising a honeycomb (or other noncontiguous-type surface) surface on which objects are placed.
- solid shelves 132 versus honey-combed
- mixed material e.g., substantially non-metallic shelves in combination with metallic material, two or more different non-metallic materials, etc.
- the surfaces of the shelves 132 may include shadow-boxing or other mechanisms to aid in distinguishing when objects are removed.
- each of the objects 120 a - 120 c includes an RFID tag 122 (herein, also tag(s) 122 ) affixed thereto.
- the tags 122 may be integrated into each object 120 a - 120 c .
- the tags 122 may be affixed to switches (not shown) on which the objects 120 a - 120 c rest, as explained further below.
- the computing system 200 a In operation, when the locking doors 106 and 108 are closed, the electro-magnetic lock 110 engages, and the closed-door (or re-engagement in some embodiments) status is sensed or received by the computing system 200 a , enabling the computing system 200 a to resume the scanning process. That is, the computing system 200 a generates excitation signals (e.g., RF, though not limited to the defined radio frequency band as commonly defined in communications systems) that are emitted from T/R antennas 116 a , 116 b and 118 a , 118 b . These RF signals are dispersed throughout the enclosure 102 and impinge on the tags 122 as part of the scanning process.
- excitation signals e.g., RF, though not limited to the defined radio frequency band as commonly defined in communications systems
- Transmitted signals (including reflected signals) sent by the tags 122 in response to the excitation signals are received at the T/R antennas 116 a , 116 b and 118 a , 118 , and processed (e.g., demodulated, decoded, etc.) by receiver electronics in a reader in known manner within the computing system 200 a .
- the computing system 200 a uses the processed data to identify objects present and missing from the enclosure, which is also part of the scanning process. That is, the signals received from the tags 122 are read by the computing system 200 a to determine the quantity of tags 122 currently located within the enclosure 102 , from which a determination is made as to which tags are missing.
- the frequency of the scanning process is configurable, and in one embodiment, may occur at a rate of every 0.75 seconds while the doors 106 and 108 are closed and locked.
- a user attempting to gain access to the interior of the enclosure undergoes an authentication process.
- the user enters his or her name, and/or other identification, as explained above at the user interface 112 (e.g., at the GUI 130 ).
- the computing system 200 a ceases the scan process and de-energizes the electro-magnetic lock 110 , after which the authenticated user is able to open the locking door 106 (and if needed, locking door 108 ). Subsequently, the user either returns or retrieves one or more objects.
- the closed-door in one embodiment is sensed by sensor 107 , the status of which is communicated to the computing system 200 a , resulting in the computing system 200 a resuming the scanning process, which include the reading of tags 122 as explained above.
- the computing system 200 a is able to determine what has been removed or added and provide an update through display of the status on the GUI 130 and/or elsewhere.
- the computing system 200 a renders the results on the GUI 130 , which in one embodiment continuously displays an update of the status of objects associated with (e.g., objects removed and returned) the enclosure 102 by displaying which objects have been added or removed and the number of objects added to or removed from the enclosure 102 .
- objects associated with e.g., objects removed and returned
- additional information displayed by the GUI 130 or displayed or provided elsewhere may include the name and/or identification number of the user, the department to which the user is associated, among other information through cooperation with a data structure located in, or in communication with, the computing system 200 a .
- the update of the status can be in the form of an audio (e.g., verbal or periodic sound) update in addition to or in lieu of the visual update.
- the scanning process continues until interrupted by the next authenticated access to the interior of the enclosure 102 .
- FIG. 2A illustrates another embodiment of an object tracking system 100 b .
- the object tracking system 100 b comprises an enclosure 202 embodied as a drawer-type cabinet comprising one or more access members, also referred to herein individually or collectively as drawers 204 , that slidably move in and out of the enclosure (e.g., on rails).
- Each of the drawers comprises a handle 206 that facilitates the opening of each drawer. Similar to that mentioned above, the opening and/or closing of each of the drawers 204 may be automated in some embodiments.
- the enclosure 202 also includes, without limitation, a sensor (not shown, but similar to sensor 107 , positioned to detect the drawer closing and/or opening) and an electro-magnetic lock 210 that operates similarly to the electro-magnetic lock 110 shown in FIGS. 1 A-lB.
- the electro-magnetic lock 210 is embodied as a spring-loaded hinge assembly that swivels open when de-energized. When energized, the electro-magnetic lock 210 prevents opening of the drawers 204 (e.g., by blocking the drawers 204 ).
- the lock 210 may be alternately configured, such that de-energizing the lock 210 results in the denial of entry.
- the enclosure 202 further comprises T/R antennas 116 a , 116 b , and 118 a , 118 b associated with one or more readers (not shown) arranged in a different configuration than those shown in FIG. 1B .
- the T/R antennas 116 a and 116 b are located at the interior bottom of the enclosure 202 and the T/R antennas 118 a and 118 b are attached to the interior top of the enclosure 202 .
- T/R antennas 116 a , 116 b , 118 a , 118 b shown in FIG. 1B Similar in manner to that mentioned above with regard to the quantity and configuration of T/R antennas 116 a , 116 b , 118 a , 118 b shown in FIG. 1B , one having ordinary skill in the art would understand that fewer or greater numbers of T/R antennas, in the same or different configuration may be used in some embodiments, including the use of a single T/R antenna.
- the object tracking system 100 b further comprises a computing system 200 b , which includes a computing device 502 coupled to a transceiver control 504 (obscured from view).
- the computing device 502 further comprises a display 212 and processing hardware and software.
- the display 212 comprises a GUI 130 acting alone or in combination with a keyboard (not shown) or other user entry mechanism as described above to serve as a user interface, in similar manner to that described in FIGS. 1A-1B .
- the computing system 200 b comprises the transceiver control 504 (also referred to herein as transceiver control logic), as mentioned above, as well as a keyboard 216 associated with the computing device 502 .
- the transceiver control 504 and at least portions of the computing device 502 collectively provide functionality of a reader.
- Various examples in the industry of reader technology can be used, including those found in U.S. Pat. Nos. 4,730,188 and 5,541,574, herein incorporated by reference in their entirety, and hence further discussion of the same is omitted for brevity.
- a reader may be used in some embodiments that can be embodied as a single device with or without an integrated display, among other configurations.
- the electro-magnetic lock 210 is in the swivel-open position via the computing system 200 a de-energizing the lock 210 in response to authenticating a user (and hence providing access to the interior of the enclosure 202 ).
- a user is able to freely pull the drawer 204 (and other drawers) open.
- the drawer 204 is shown with several objects 120 d - 120 f (e.g., hammer, pliers, tape measure, respectively) resting on a surface 220 .
- the surface 220 comprises a mostly non-metallic surface, such as plastic, plexiglass, among other materials, which enables passage of the RF signals provided using the T/R antennas 116 a , 116 b , 118 a , 118 b through several drawers 204 .
- the surface 220 can be solid, while in some embodiments, the surface 220 may be of a honey-comb surface or the like, or a combination of both in some embodiments (as is true for the variety of surfaces that can be used for the shelves 132 , FIG. 1B ).
- the surface is configured with one or more shadowboxes (obscured from view by the objects) in which each object 120 d - 120 f rests.
- each of the objects 120 d - 120 f rests on a member (hidden from view) of a corresponding switch 250 (described in association with FIGS. 4A-4B ), whereby each switch 250 includes a tag 122 (obscured from view).
- the weight of the object 120 d - 120 f causes the switch 250 to open, resulting in the ability of a signal reflected from (or transmitted by) the tag 122 to be read by the computing system 200 b , which the computing system 200 b interprets as indicating a presence of the particular object in the enclosure 202 .
- the removal of the object 120 d - 120 f from a member of the switch results in the closure of the switch 250 , resulting in cancellation of the signal (e.g., via a metallic surface of the switch 250 coming in contact with the tag 122 ), which, the computing system 200 b interprets as an object missing from the enclosure 204 .
- switches 250 can be referred to in electronics parlance as a normally closed (n.c.) state (where two members of the switch 250 , one having the tag 122 , are in contact when unloaded), normally open (n.o.) configurations can be used whereby the state of the switch is interpreted differently by the computing system 200 b . Further explanation of various embodiments of the switches 250 follows below in association with FIGS. 4A-4B . Additionally, one having ordinary skill in the art can recognize within the context of this disclosure that tags 122 may be attached to, or integrated with, the objects in addition to or in lieu of using the switches 250 in some embodiments.
- the operation of the object tracking system 100 b is similar to that described for the object tracking system 100 a . That is, the computing system 200 b implements a scanning operation continuously until authentication (or in some embodiments, responsive to opening of the drawer 204 and/or disengagement of electro-magnetic lock 210 ), enabling the monitoring of inventory of objects 120 d - 120 f in the drawer 204 .
- a user is authenticated through the GUI 130 and/or keyboard 216 (e.g., manual entry, or in some embodiments, a separate device may be used to enable the scanning of an ID code or the like as described above).
- the computing system 200 b de-energizes the electro-magnetic lock 210 , the lock swivels open, and the user is able to now gain access to contents in the drawer 204 .
- the computing system 200 ceases the scanning process. In some embodiments, the cessation of the scanning process can be responsive to opening the drawer 204 and/or responsive to unlocking the door (as opposed to opening of the door).
- the computing system 200 b then resumes the scanning process to identify what objects have been removed from or returned to the drawer 204 , and provides an updated count (status update) of those objects on the GUI 130 (and/or remotely to other personnel or devices).
- the status update may be visual, audible, or a combination of both.
- FIG. 3 is another embodiment of an object tracking system 100 c . Operation is similar to that described above for the object tracking systems 100 a and 100 b .
- the object tracking system 100 c comprises a combination of the enclosures 102 and 202 , with the enclosure 102 stacked upon the enclosure 202 , although in some embodiments, the relative location of enclosures 102 and 202 can be reversed.
- the computing system 200 c is shown included in cap 114 , and provides the operational functionality for the entire assembly, including authentication, the energizing/de-energizing of the electro-magnetic locks 110 and 210 for the respective enclosure 102 and 202 , and scanning functionality.
- the enclosures 102 and 202 are separated by a metal divider (not shown) disposed between the two enclosures 102 and 202 .
- authentication for each enclosure 102 and 202 may be implemented separately.
- the T/R antennas may be positioned in similar manner in the enclosure 102 as shown in FIG. 1 B .
- the T/R antennas (not shown) for the enclosure 202 may all be located at the interior bottom of the enclosure 202 .
- Other T/R antenna configurations can be used, as explained above.
- the user interface 112 includes a GUI 130 , and serves to provide, in cooperation with the computing system 200 c , authentication functionality for both enclosures 102 and 202 . Scanning may occur independently for the respective enclosure 102 and 202 , or performed as a single entity.
- the scanning process may cease for the enclosure 202 , but continue for the enclosure 102 (i.e., is independent), assuming locking doors 106 or 108 are not open.
- the opening of either locking doors 106 , 108 or drawers 204 results in a cessation of the scanning process (i.e., treated as a single entity) for the entire system.
- the choice to operate in independent fashion or otherwise may be configurable by the user.
- FIGS. 4A and 4B are schematic diagrams that illustrate one embodiment of a switch 250 a (also referred to herein as an RFID switch), configured as a rocker-type switch.
- the RFID switch 250 a comprises a first portion 402 hingably coupled at slotted connecting members 404 and 405 attached to (or molded with) a second portion 406 .
- the first portion 402 comprises a first member 408 in angular relation to a second member 410 .
- the angle formed between the first member 408 and the second member 410 is approximately 135 degrees, though other angular dimensions may be used in some embodiments.
- the second member 410 also comprises two stubs 412 and 413 , each projecting away and within the plane of the second member 410 .
- the two stubs 412 and 413 are in hingable relationship to the slotted connecting members 404 and 405 , respectively, enabling first member 408 to rotate from an approximately 45 degree angle (unloaded position) with respect to a planar surface (e.g., surface 220 of drawer 204 ) on which the switch 250 a rests, to a position whereby the first member 408 comes to loaded rest on the surface or slightly above the surface, the loaded ending position depending on the object geometry.
- the weight of the second member 410 is greater than the unloaded weight of the first member 408 .
- the bias provided by the difference in weight can be replaced with a spring or other biasing mechanisms.
- the second member 410 also comprises a first surface 414 that, when the switch 250 a is unloaded (no object placed on the first member 408 ), lies adjacent to a second surface 418 of the second portion 406 .
- the first surface 414 comprises, in a defined area located approximately centrally on the first surface 414 , a material (herein, disabling material) that cancels or otherwise disables signals surrounding the tag 122 located on the second surface 418 , thus disabling any ability to read the tag at the computing system 200 a , 200 b , or 200 c .
- the disabling material may be integrated into the first surface 414 .
- the disabling material may be affixed to the first surface 414 , directly or through an intermediary material.
- the disabling material may be comprised of a metallic material, including aluminum foil, and may comprise an area substantially equal to the area of the tag 122 , or may be configured as an outline trace of approximately equal length of each side-edge of a tag 122 .
- the disabling material may comprise a fluid, such as water, that is enclosed in a plastic package affixed to the first surface 414 , or integrated within the first surface 414 in some embodiments. Any disabling material may be used that cancels the surrounding signals of the tag 122 or otherwise renders the signals surrounding the tag 122 ineffective for purposes of reading the response signals.
- the second portion 406 comprises the second surface 418 , upon which (or integrated within) a tag 122 is located. Though shown located centrally on the second surface 418 and encompassing an area as shown that is substantially smaller than the area of the second surface 418 , it can be appreciated that the tag 122 can be located elsewhere on the second surface 418 (and hence the disabling material on the first surface 414 is likewise positioned such that when the switch 250 a is unloaded, the disabling material is substantially coincident with the location of the tag 122 ). Further, the tag 122 may have different relative dimensions with respect to the second surface 418 than that shown in FIG. 4B .
- the second portion 406 also comprises four legs 414 that rest on the planar surface of the drawer or shelf of the enclosure.
- the legs 414 can be configured with an adhesive that stick to the planar surface of the drawer or shelf, or comprise sharpened or pointed bottom surfaces that puncture the planar surface, enabling resistance to movement when placed on the planar surface.
- Other mechanisms for resisting movement may be used, as can be appreciated by one having ordinary skill in the art.
- the switch 250 a is comprised of a substantially non-metal material (e.g., plastic, rubber, wood, graphite, etc.), with at least a portion of the first surface 414 (the area where the disabling material is positioned) comprised of a metallic material or other material that causes an inability (by the computing system 200 a , 200 b , 200 c , hereinafter using 200 b in the discussion of FIGS. 4A-4B for purposes of brevity) to read the tag 122 .
- a substantially non-metal material e.g., plastic, rubber, wood, graphite, etc.
- each tag 122 can be altered (and hence determined and/or controlled) based on the position of the switch 250 a , hence assisting in the determination of whether an object is present in an enclosure or not.
- actual contact between the tag 122 and the disabling material need not be made to cause an inability to read the tag 122 , depending on the size of the tag 122 , the strength and angle of incidence of the excitation signal, environmental influences (e.g., interference) within an enclosure, among other factors.
- the separation distance between the tag 122 and the disabling material may be approximately up to 0.125 inches to disable the tag 122 , depending on the surrounding environment, angle of incidence, among other factors.
- an object placed on the first member 408 causes the first member 408 to rotate in the direction of the gravitational force resulting from the weight of the object due in part to the rotational movement enabled by the connecting members 412 and 413 .
- This rotation results in a separation between the first surface 414 comprising the disabling material and the second surface 418 comprising the tag 122 , hence exposing the tag 122 to excitation signals delivered from the computing system 200 b as well as enabling the transmission (including reflection) of response signals by the tag 122 back to the computing system 200 b to enable read functionality.
- the switch 250 a movement causes the tag 122 to possess a first state that allows for reading of the tag 122 (e.g., the computing system 200 b can determine that the object is present in the enclosure).
- the unloading of the object causes a “rocker” motion whereby the first member 408 returns to the unloaded position and the second member 410 , connected to the first member 408 , returns to rest upon the second portion 406 .
- the tag 122 is in contact with the disabling material residing on the first surface 414 , which renders any attempt at reading the tag 122 ineffective.
- the unloading of the switch 250 a commences a second state for the tag 122 , whereby the tag 122 cannot be read by the computing system 200 b (e.g., due to cancellation or otherwise of signals due to proximity of the tag 122 to the disabling material).
- the computing system 200 b can determine that the object is missing, for instance by comparison to an expected object inventory or object count.
- the computing system 200 comprises the computing device 502 that is electrically coupled to and controls user interface 112 (or user interface 212 , the latter omitted from discussion hereinafter for brevity), electro-magnetic lock 110 (or 210 , the latter omitted from discussion hereinafter for brevity), and sensor 107 .
- the computing device 502 is also coupled to transceiver control 504 , which comprises well-known transmitter and receiver functionality that is electrically coupled to one or more antennas, such as T/R antennas 116 a , 116 b , 118 a , 118 b .
- the transceiver control 504 wirelessly receives and processes (e.g., demodulates, decodes, etc.) signals from tags 122 that are attached to or integrated with objects (or attached to or integrated with switches associated with the objects) located within an enclosure (e.g., enclosure 102 , 202 , etc.).
- the transceiver control 504 and portions of the computing device 502 comprise a reader 506 , which in one embodiment, collectively performs the scanning processes described herein. Although shown as separate modules, the functionality of the transceiver control 506 and reading and control functionality (e.g., software, firmware, etc.) of the computing device 502 can be integrated into a single device, such as an applications specific integrated circuit (ASIC) or other processing device.
- the computing device 502 receives the information corresponding to the received radio frequency signals (e.g., decoded data) from the transceiver control 504 , and tracks and monitors the inventory of objects within an enclosure.
- radio frequency signals e.g., decoded data
- the computing device 502 is further configured to control power through cooperation with power source 508 to electro-magnetic locks 110 , which through user interface devices 606 ( FIG. 6 ) effectuates the locking or unlocking of the locking doors 106 , 108 or drawers (e.g., 204 ) based on data entered by a user through the user interface 112 . That is, the computing device 502 is used to determine, based on information obtained via user interface 112 , whether a user is authorized to access the interior of the enclosure (e.g., enclosures 102 , 202 ), and then controls access to the enclosure.
- the power source 508 can be located remotely from the computing system 200 .
- the sensor 107 communicates status of door closing and/or opening to the computing device 502 , such as via polling mechanisms employed by the computing device 502 or through active transmission of status information to the computing device 502 .
- the computing system 200 can be communicatively coupled to a remote computing device 512 via a network 510 so that the object tracking system 100 a - 100 c can communicate with the remote computing device 512 .
- the remote computing device 512 can transmit new or updated user information, cost account information, security information, replenishment information, and inventory information to the computing system 200 .
- the computing system 200 can transmit monitored and tracked information to the remote computing device 512 , enabling the information or object inventory information to be stored and/or monitored at a second location.
- FIG. 6 is a block diagram that illustrates an embodiment of an architecture for the computing device 502 shown in FIG. 5 .
- the computing device 502 comprises a processing device 602 , memory 604 , one or more user interface devices 606 , one or more I/O devices 608 , and one or more networking devices 610 , each of which is connected to a local interface 612 .
- the processing device 602 can include any custom made or commercially available processor, a central processing unit (CPU) or an auxiliary processor among several processors associated with the computing device 502 , a semiconductor based microprocessor (in the form of a microchip), or a macroprocessor.
- the memory 604 can include any one or a combination of volatile memory elements (e.g., random access memory (RAM, such as DRAM, SRAM, etc.)) and nonvolatile memory elements (e.g., ROM, hard drive, tape, CDROM, etc.).
- volatile memory elements e.g., random access memory (RAM, such as DRAM, SRAM, etc.
- nonvolatile memory elements e.g., ROM, hard drive, tape, CDROM, etc.
- the one or more user interface devices 606 comprise those components with which the user can interact with the computing device 502 , such as user interface 112 . Further, user interface devices 606 may also work in cooperation with GUI-display rendering software resident in the memory 604 (e.g., as part of reader logic 616 , authentication logic 618 , or as a separate module). Where the computing device 502 comprises a server computer or similar device, these components can comprise those typically used in conjunction with a PC such as a keyboard and mouse.
- the one or more I/O devices 608 comprise components used to facilitate connection of the computing device 502 to other devices, for instance, one or more serial, parallel, small system interface (SCSI), universal serial bus (USB), or IEEE 1394 (e.g., FirewireTM) connection elements, among other elements.
- the I/O devices also generically represent various components (and corresponding connections and/or interfaces) shown in and described in association with FIG. 5 , including the power source 508 , electro-magnetic locks 110 or 210 , and sensor 107 .
- the networking devices 610 comprise the various components used to transmit and/or receive data over a network 510 , where provided.
- the networking devices 610 include a device that can communicate both inputs and outputs, for instance, a modulator/demodulator (e.g., modem), a radio frequency (RF) or infrared (IR) transceiver, a telephonic interface, a bridge, a router, as well as a network card, etc.
- a modulator/demodulator e.g., modem
- RF radio frequency
- IR infrared
- the memory 604 normally comprises various programs (in software and/or firmware) including an operating system (O/S) 614 , reader logic 616 , authentication logic 618 , object data structure 620 , and authorized user data structure 622 .
- Other software not shown includes logic (e.g., data structures and/or programming code) to assist in inventory management.
- the O/S 614 controls the execution of programs, including the reader logic 616 , authentication logic 618 , object data structure 620 , and authorized user data structure 622 , and provides scheduling, input-output control, file and data management, memory management, and communication control and related services.
- the reader logic 616 controls the scanning process described herein. Accordingly, the reader logic 616 effects the generation and transmission of excitation signals from the transceiver control 504 and provides for the reading and interpretation of data corresponding to response signals received from tags 122 by the transceiver control 504 to determine whether an object has been returned or removed.
- the reader logic 616 implements, in cooperation with the transceiver control 504 , scanning of the interior of the enclosure, and compares the received tag information (e.g., serial number data) with expected tag information (e.g., serial number data) stored in the object data structure 620 (which in one embodiment, comprises a database of identifying information corresponding to objects (and their associated tags) that are expected to be in the enclosure in view of a previous association process with associated tags of that enclosure). Based on the comparison, the reader logic 616 determines whether an object has been removed or returned.
- tag information e.g., serial number data
- expected tag information e.g., serial number data
- the reader logic 616 also provides for functionality involved in associating tags 122 to objects, including the provision of various GUIs that are provided at start-up or responsive to object updates (e.g., new objects to enter into an enclosure or remove obsolete objects) to enable a user to accomplish association to objects and populate the object data structure 620 with data corresponding to the new objects.
- object updates e.g., new objects to enter into an enclosure or remove obsolete objects
- the authentication logic 618 controls access to an enclosure in cooperation with the user interface 112 and receives information via the user interface 112 and electro-magnetic lock 110 . That is, when an enclosure is locked, and a user seeks access to the enclosure, the user enters information at the user interface 112 . Upon receipt of user information, the authentication logic 618 compares the entered information (e.g., one or more of name, pin number, password, social security number, biometric data, etc.) with information in the authorized user data structure 622 (which in one embodiment, comprises a database of identification information for personnel that are permitted to access objects from within an enclosure). If a match is found, the authentication logic 618 signals the electro-magnetic lock 110 to disengage and hence allow access by that individual to the interior of the enclosure. If a match is not found, the authentication logic 618 maintains engagement of the electro-magnetic locks 110 or 210 .
- the entered information e.g., one or more of name, pin number, password, social security number, biometric data, etc.
- the reader logic 616 and authentication logic 618 can be implemented in hardware, software, firmware, or a combination thereof. In one embodiment, the reader logic 616 and authentication logic 618 are implemented in software that is stored in a memory and that is executed by a suitable instruction execution system. If implemented in hardware, as in an alternative embodiment, the functionality of the reader logic 616 and authentication logic 618 can be implemented with any or a combination of the following technologies, which are all well known in the art: a discrete logic circuit(s) having logic gates for implementing logic functions upon data signals, an application specific integrated circuit (ASIC) having appropriate combinational logic gates, a programmable gate array(s) (PGA), a field programmable gate array (FPGA), etc.
- ASIC application specific integrated circuit
- PGA programmable gate array
- FPGA field programmable gate array
- the reader logic 616 and authentication logic 618 which in one embodiment comprises an ordered listing of executable instructions for implementing logical functions, can be embodied in any computer-readable medium for use by or in connection with an instruction execution system, apparatus, or device, such as a computer-based system, processor-containing system, or other system that can fetch the instructions from the instruction execution system, apparatus, or device and execute the instructions.
- method 618 a enables authentication of a user to enable or deny access to the interior of an enclosure.
- a method 618 a implemented in one embodiment by the authentication logic 618 , comprises receiving user identifying information entered by a user at the user interface 112 according to one or more of the mechanisms described above ( 702 ). Further, the method 618 a determines, based on querying an authorized user data structure 622 , whether the user is authorized to access the interior of a particular enclosure ( 704 ).
- the method 618 a denies access ( 706 ).
- a denial can take the form of the maintenance of an engagement signal to the electro-magnetic lock 110 (or in other configurations, abstaining from sending a signal to disengage the lock 110 ), and optionally one or more of the following: a message sent to the GUI 130 that alerts the user that access is denied, an alert sent to an administrator located remotely of an unauthorized attempt at access, among others.
- the method 618 a permits access to the interior of the enclosure by signaling to the electro-magnetic lock 110 to unlock the door(s) and/or drawer(s) of the enclosure to enable access ( 708 ).
- the method 618 a also signals to the reader logic 616 (responsive to communication by sensor 107 ) that authentication has been achieved, which prompts the reader logic 616 to cease the scanning process ( 710 ).
- the cessation of the scanning process is prompted by disengagement (unlocking) or the actual opening (as opposed to unlocking) of a drawer or door of the enclosure as sensed by a sensor 107 (or current sensor), which communicates the change in opening/closing status to the reader logic 616 .
- the authentication logic 618 through cooperation with the user interface device 606 , senses the disengagement (e.g., via well-known current sensing capabilities) of the lock 110 , and communicates the change in status to the reader logic 616 to enable the cessation of the scanning process.
- the reader logic 616 senses the disengagement through cooperation with the user interface device 606 .
- the resumption of scanning occurs according to the mechanisms described above.
- the sensor 107 senses door closure, and communicates this status to the reader logic 616 , which commences the scan process.
- one scanning method embodiment for a given enclosure referred to method 508 a and shown in FIG. 8
- the method 508 a comprises, responsive to sensing or receiving status information corresponding to the door(s) and/or drawers(s) of an enclosure being closed (or locked in some embodiments), commencing transmitting excitation signals to one or more tags 122 ( 802 ).
- the method 508 a further comprises receiving response signals from the one or more tags 122 ( 804 ), and comparing information pertaining to the response signals with information in an object data structure 620 comprising information about objects and associated tags 122 expected to be located in the enclosure ( 806 ).
- the method 508 a further comprises, responsive to the comparison, determining which tags 122 are present in the enclosure and which tags have been removed ( 808 ).
- the method 508 a further comprises providing feedback of the status of objects associated with the enclosure ( 810 ).
- the method 508 a repeats the aforementioned process until the door(s) and/or drawer(s) are opened upon successful authentication to the interior of the enclosure, unlocking of the door(s) and/or drawer(s), or successful authentication.
- one method embodiment referred to as object tracking method 100 d and shown in FIG. 9 , comprises scanning an interior space of an enclosure, the enclosure having at least one radio frequency identification (RFID) tag and at least one object associated with the at least one RFID tag ( 902 ), receiving an indication that a user is attempting access to the interior space ( 904 ), and responsive to receiving the indication, determining whether access to the interior space is permitted by the user ( 906 ).
- RFID radio frequency identification
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Economics (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Quality & Reliability (AREA)
- Entrepreneurship & Innovation (AREA)
- Human Resources & Organizations (AREA)
- Marketing (AREA)
- Operations Research (AREA)
- Strategic Management (AREA)
- Tourism & Hospitality (AREA)
- General Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Development Economics (AREA)
- Finance (AREA)
- Accounting & Taxation (AREA)
- Lock And Its Accessories (AREA)
Abstract
Description
- This application is a continuation-in-part of copending U.S. utility application entitled, “Portal System for Controlled Space,” Ser. No. 10/990,907, filed Nov. 17, 2004, which claims the benefit of U.S. provisional application having Ser. No. 60/565,089, filed Apr. 23, 2004, both of which are entirely incorporated herein by reference.
- This application is related to copending U.S utility patent application entitled “Object Tracking in an Enclosure,” having docket No. 82331-1020, filed on the same date and accorded Ser. No. xx/xxx,xxx, which is entirely incorporated herein by reference.
- The present disclosure is generally related to monitoring and tracking objects, and more particularly, to systems, devices and methods for monitoring and tracking objects in an enclosure using radio frequency identification (RFID) technology.
- Companies typically have difficulties tracking inventory items or objects and their usage within their facilities. Many inventory items are misused, misplaced, and improperly tracked and replenished by the employees of the companies. In some industries, misplaced items can lead to serious mishaps. For instance, in the aerospace industry, a wrench or other tool left behind in the maintenance or construction of an aircraft engine can result in the catastrophic failure of an engine valued at hundreds of thousands of dollars, or even worse if undetected before operation. Various safeguards have been established in the aerospace industry to prevent such mishaps, such as foreign object detection or FOD. FOD requires procedures that monitor the location of any object that can fall into (or otherwise be mistakenly left in) an aircraft or aircraft component. In a typical aerospace manufacturing environment, such procedures may result in one or more inspection personnel providing inspections of tool cabinets and tool drawers (herein, such tool cabinets and drawers collectively or individually referred to generally as enclosures). Shadowboxing may also be implemented in accord with such procedures. Shadowboxing refers to an outline of indirect material (e.g., objects such as wrenches, gauges, safety glasses, tools, pencils, etc.) in or on surfaces located within enclosures. The outline (or shadowbox) may be further distinguished from the surrounding surfaces by possessing a different color, different material, and/or different topology (e.g., such as a recess in a particular material). In some embodiments, other methods to provide distinction may be used (e.g., pegs or protrusions providing an outline of an object) alone or in combination with the aforementioned distinguishing features. When an object does not reside in the shadowbox, the outline provides an immediate visual indication to inspection personnel that the object is missing, and thus other procedures are invoked to track the missing object to prevent possible damage to equipment or harm to personnel. In a given manufacturing environment, the quantity of such enclosures that are to be checked one or more times throughout the day can consume a considerable amount of man-hours.
- The present disclosure provides various method and apparatus embodiments involving RFID switching.
- One method embodiment, among others, includes receiving an excitation signal at a switch associated with a radio frequency identification (RFID) tag and a disabling material, and changing a state of the RFID tag with the switch based on proximity of the disabling material to the RFID tag.
- Another method embodiment, among others, comprises sending an excitation signal to a switch associated with a radio frequency identification (RFID) tag and a disabling material, and receiving a response to the excitation signal based on a separation distance between the disabling material and the RFID tag, the separation distance based on a change in the switch.
- One apparatus embodiment, among others, comprises a first member comprising a disabling material, a second member in moveable relationship with respect to the first member, and a multi-state radio frequency identification (RFID) tag coupled to the second member that changes state based on a separation distance between the RFID tag and the disabling material.
- Other systems, devices, methods, features, and advantages of the present disclosure will be or become apparent to one with skill in the art upon examination of the following drawings and detailed description. It is intended that all such additional systems, methods, features, and advantages be included within this description, be within the scope of the present disclosure, and be protected by the accompanying claims.
- Many aspects of the disclosure can be better understood with reference to the following drawings. The components in the drawings are not necessarily to scale, emphasis instead being placed upon clearly illustrating the principles of the disclosed systems, devices, and methods. Moreover, in the drawings, like reference numerals designate corresponding parts throughout the several views.
-
FIGS. 1A-1B are elevation views that illustrate an embodiment of an object tracking system. -
FIG. 2A is an elevation view that illustrates another embodiment of an object tracking system. -
FIG. 2B is a plan view of the object tracking system shown inFIG. 2A with an enclosure shown having an opened drawer. -
FIG. 3 is an elevation view of another embodiment of an object tracking system that combines features of the object tracking system embodiments shown inFIGS. 1A-2B . -
FIGS. 4A-4B are schematic diagrams that show one embodiment of a radio frequency identification (RFID) switch that can be used in cooperation with the object tracking systems shown inFIGS. 1A-3 -
FIGS. 5-6 are block diagrams of embodiments of a computing system and components therein of the object tracking systems shown inFIGS. 1A-3 . -
FIG. 7 is a flow diagram that illustrates an authentication method embodiment of the object tracking systems shown inFIGS. 1A-3 . -
FIG. 8 is a flow diagram that illustrates a scanning method embodiment of the object tracking systems shown inFIGS. 1A-3 . -
FIG. 9 is a flow diagram that illustrates an object tracking method embodiment corresponding to the object tracking systems shown inFIGS. 1A-3 . - Disclosed herein are various embodiments of systems, devices, and methods that regulate access to objects in an enclosure, and monitor the entry of objects into, and removal of objects from, an enclosure using radio frequency identification (RFID) technology. Such systems, methods, and devices are herein referred to generally as object tracking systems.
- A summary of various terms used herein is provided below, followed by a brief overview of one or more embodiments of an object tracking system and subsequently a more detailed description of these and other embodiments. RFID refers to technology that uses radio waves to automatically identify people or objects. An object refers to indirect material to be used in the support of operations of a facility, work environment, or the like, and includes pencils, tools, safety glasses, gauges, wrenches, etc.), as well as direct material (e.g., other inventory objects, such as files, jewelry, finished product, etc.). An object can be tagged and optionally shadowboxed and stored within an enclosure. An enclosure refers to an apparatus or environment that stores one or more objects, and which is configured to enable access to one or more objects through openings that are removably blocked by one or more access members (e.g., one or more cabinet doors, drawers, panels, etc.) that can be closed and opened. Examples of enclosures include drawer-type cabinets, cabinets with shelving, etc., or a combination of the same, or apparatuses having similar functionality.
- Having described various terms used herein, a brief overview of one or more embodiments of an object tracking system is provided below. Certain embodiments of the object tracking systems comprise a computing system that provides authentication functionality, whereby access to one or more objects in an enclosure is permitted when a user seeking access is authenticated (e.g., confirmed that he or she is authorized to access the interior of the enclosure). For instance, in one embodiment, a user enters his or her identification information (e.g., by manual entry, through bar code or magnetic strip scanning, etc.) via an interface (e.g, touch-screen, graphical user interface (GUI), keypad entry interface, magnetic card reader, bar scanner, biometric scan, etc.). The computing system, in one embodiment through comparison of the received identification information with authorized user information in a database or other data structure, determines if the user is authorized to access the interior of the enclosure. Upon successful authentication, access to the interior of the enclosure by the user is enabled, as described further below.
- With regard to object tracking functionality, each object stored in an enclosure is associated with a corresponding radio frequency identification (RFID) tag. In one embodiment, each object is associated with a switch, the switch having a tag affixed thereto. When the switch is loaded with the object, the tag possesses one state. When the object is removed from the enclosure, the tag possesses another state. Each state is treated differently by the computing system to enable the monitoring of when an object is removed and when an object is returned or otherwise inserted into the enclosure, as described below. In some embodiments, each RFID tag is attached to, or integrated into, each object in an enclosure. In some embodiments, a combination of these methods for associating RFID tags with objects may be used. The initial association of each RFID tag with a particular object can be implemented through a user interactive start-up or configuration procedure implemented at any point in time.
- Detection and identification of an object occurs through an interaction of signal exchanges between RFID tags in an enclosure and the computing system. In one embodiment, an RFID tag stores an identifier on a microchip that is coupled to an antenna, the identifier associated (e.g., through the association process mentioned above) with an object in the enclosure. The microchip and the antenna comprise what is often referred to as an RFID transponder or RFID tag. The RFID tag is responsive to an excitation signal from the computing system, the latter which includes one or more readers, with each reader having receiver/transmitter (or transceiver) functionality as described further below. That is, in response to being activated or awakened by the excitation signal from the computing system (e.g., the reader of the computing system), the RFID tag transmits a response signal comprising the identification information to the reader. The reader converts the radio waves provided from the RFID tag into information that can be used to detect the presence or absence of an object associated with a particular RFID tag. The transmission of the identification information from the RFID tag may be implemented in some embodiments by generating an “original” signal (e.g., separate from and independent of the received excitation signal) in response to excitation by the signal from the reader. In some embodiments, the transmission may be implemented by reflecting back a portion of the excitation signal from the reader in a process referred to as backscatter. In some embodiments, a combination of both processes may occur. In other words, the RFID tags included within the scope of this disclosure include active, passive, or semi-passive tags, and in some embodiments, a combination of one or more of these types of RFID tags may be used in a given enclosure.
- Having described generally the underlying functionality and architecture of certain embodiments of an object tracking system, one object tracking method embodiment can generally be described as follows. The computing system continually emits excitation signals to the interior of the enclosure in an effort to track which objects currently reside within the enclosure. Such emission of excitation signals to the interior for reception by the RFID tags, the receiving and reading of the information corresponding to the response signals from the RFID tags, and the determination as to which tags have been removed or returned (a hence which objects have been removed or returned) is also referred to herein as a scan, scanning, or a scanning process or the like. When a user seeks to access the interior space of the enclosure (e.g., to return an objet, or remove an object), the user enters identification information at an interface of the enclosure, which is received and processed by the computing system. If the user is not authorized to access the interior space of the enclosure, the user is denied access (e.g., the access member(s) removably blocking access to the interior of the enclosure remain locked). If the user is authorized, the computing system disengages a locking mechanism coupled to the access member(s) of an entrance or access point of the enclosure to enable access to the interior space of the enclosure, and the computing system in one embodiment temporarily ceases the scanning process. In one embodiment, the temporary cessation of the scan process occurs responsive to authentication (before disengagement of the locking mechanism). In some embodiments, the temporary cessation of the scan process can occur responsive to the disengagement of the locking mechanism, the opening of an access member, or a combination of two or more of the above described mechanisms in a redundant fashion (e.g., if the scan process does not cease after authentication, the disengagement and/or the opening of the access member acts as a fails-safe mechanism to ensure the scanning process ceases).
- Assume the user removes a tool. Such removal of the tool either removes the associated RFID tag (assuming coupling or integration of the RFID tag with or within the tool), or the removal of the tool changes the status or state of an RFID tag, for instance by closing of a metallic switch upon the RFID tag to disable the ability of the computing system to properly read the RFID tag. When the user closes the access member (e.g., cabinet door), a sensor senses that the access member is closed and communicates (e.g., by actively sending or via polling mechanisms implemented by the computing system) this change in access member status to the computing system, which responsively resumes the scan process. In some embodiments, the re-engagement (automatic upon closure, or in some embodiments, controlled by the computing system responsive to receipt of status of door opening from the sensor) of the locking mechanism is sensed or otherwise communicated to the computing system, and the computing system resumes the scanning process responsive to re-engagement. Through the resumption of the scanning process, the computing system determines that an object listed in its corresponding database is not detected during the scanning process (e.g., either because the tag is physically removed from the enclosure or the tag status has changed to a non-readable state in a switch embodiment). Thus, from the signals received from the RFID tags, the computing system (e.g., software in the computing system) updates the count of the objects associated with the enclosure and continually updates the accuracy of such a count. Additionally, the computing system provides feedback of that missing tool to a user, operator, or other device (e.g., networked computer used by a tool manager or quality assurance personnel responsible for monitoring tool inventory and/or compliance with safety protocols among one or more enclosures). Such feedback may be implemented via one or more of a local and/or remote screen display, warning lights, sound, among other mechanisms described below.
- Having described various system and method embodiments, what follows is a further description of these and other embodiments in the context of an object tracking system for authorized access and tracking of indirect materials, with the understanding that other implementations (e.g., for use with direct materials in the same or other environments) will similarly benefit from the disclosed principles of operation. Referring now to
FIGS. 1A and 1B , shown is one embodiment of anobject tracking system 100 a that comprises anenclosure 102 embodied as a cabinet, and acap 114 that rests on top of, or is otherwise integrated with, theenclosure 102. In some embodiments, thecap 114 can be located elsewhere, such as on the side of theenclosure 102, below theenclosure 102, or remotely from theenclosure 102. Theenclosure 102 comprises anaccess mechanism 104 from which a user gains access to the interior of theenclosure 102. Theaccess mechanism 104 may comprise a handle, knob, latch, or other suitable mechanism for permitting entry by a user into the interior of theenclosure 102. - The
enclosure 102 further comprises two access members also referred to herein as lockingdoors door 106 is opened first before lockingdoor 108 can be opened. Theenclosure 102 also includes a sensor 107 (e.g., electromechanical sensor, photo-diode, etc.) configured to detect when the lockingdoor 108 is closed. One having ordinary skill in the art can understand in the context of this disclosure that the location or type ofsensor 107 can vary, and in some embodiments, can be integrated within other components, such as withinaccess mechanism 104 or electro-magnetic lock 110. Further,sensor 107 can actively communicate the status (e.g., of door closing) to thecomputing system 200 a, or in some embodiments, can be polled by thecomputing system 200 a, among other mechanisms including a combination of the mechanisms described above or other mechanisms for detecting and communicating the status. In some embodiments, each lockingdoor access mechanism 104 to enable independent entry of separate (or shared) interior spaces withinenclosure 102. Although illustrated (e.g.,FIG. 1B ) as using a hinge mechanism to open and close the lockingdoors - In one embodiment, access is permitted or denied through use of an electro-
magnetic lock 110, which is fixedly coupled to theenclosure 102. In some embodiments, mechanisms other than, or in addition to, electro-magnetic operation may be employed, such as electromotive forces, mechanical locks, among other well-known mechanisms to enable controlled opening and locking of lockingdoors magnetic lock 110 comprises afirst portion 110 b coupled to the lockingdoor 106 and asecond portion 110 a coupled to thecap 114 of theenclosure 102. Though shown located towards the top of theenclosure 102, it is noted that the electro-magnetic lock 110 can be coupled anywhere on theenclosure 102 so long as the electro-magnetic lock 110 engages and disengages the lockingdoor 106 in a manner that controllably permits or denies access to the interior of theenclosure 102. - The electro-
magnetic lock 110, when energized by thecomputing system 200 a (e.g., via self-contained power in one embodiment, or in some embodiments, when power is supplied remotely and switched by thecomputing system 200 a), denies entry by prohibiting the locking door 106 (and hence, in one embodiment by virtue of overlapping doors, locking door 108) from being opened. When de-energized, the electro-magnetic lock 110 permits opening of the lockingdoor 106. Upon closure of thedoors magnetic lock 110 automatically re-engages and thesensor 107 senses the closure and communicates (e.g., actively or passively) the status to thecomputing system 200 a to subsequently enable resumption of the scanning process. As explained above, in some embodiments, the re-engagement of electro-magnetic lock 110 is communicated to (or otherwise sensed by, such as through the use of a current sensor) thecomputing system 200 a, which responsively resumes the scan process. In some embodiments, the electro-magnetic lock 110 is re-engaged in response to control signals from thecomputing system 200 a (e.g., the latter prompted in response to receiving the status of door closing from the sensor 107). As the operation of electro-magnetic locks is well-known, further description is omitted here for brevity. Although described in the context of manual opening and closing of the lockingdoors - The
cap 114 is located, in one embodiment, at the top of theenclosure 102. Thecap 114 houses acomputing system 200 a, which is symbolically represented in phantom with a dashed box. Thecomputing system 200 a controls the authentication process used to enable entry or denial of access to the interior of theenclosure 102, while also providing scanning functionality, among other functions. One having ordinary skill in the art can appreciate that the location of the cap 114 (and hence computingsystem 200 a) may be elsewhere, for instance at the side of theenclosure 102 or located remotely. - Also coupled to the
enclosure 102 is auser interface 112, which in one embodiment comprises a graphics user interface (GUI) 130. TheGUI 130 may use light-emitting diode (LED), liquid-crystal diode (LCD), or plasma technology, among others. TheGUI 130 comprises a touch-screen that enables a user to enter a password and/or user identification by selecting his or her name on the screen and/or entering via alphanumeric button icons. In some embodiments, theuser interface 112 may include authentication procedures used in lieu of or in addition to the touch-screen GUI 130, including one or more of the following: a biometric scanner, bar code reader (e.g., for use with scannable employee identification tags comprising bar codes), magnetic card reader, electro-magnetic pushbuttons in cooperation with a display or without a display, key entry, among other mechanisms. - Continuing with reference to
FIG. 1B ,FIG. 1B shows theenclosure 102 after the lockingdoors enclosure 102 comprises four transmit/receive (T/R)antennas R antennas enclosure 102, and two of the T/R antennas enclosure 102. One having ordinary skill in the art would understand that fewer or greater numbers of antennas may be used in different locations and/or different configurations (e.g., different configurations such as separate transmit and receive antennas for each reader, among others). For instance, depending on many factors including the size of the enclosure, density of internal structures, material of internal structures located within an enclosure, quantity of objects, a single T/R antenna may be used with one reader. - Included within the
enclosure 102 is ashelving structure 130, which comprises one ormore shelves 132. Theshelving structure 130 may be configured in a variety of ways, such as with easily removable shelves 132 (e.g., snap-on versus fixably attached as with screws or bolts or other fasteners), slidable shelves that are extended and retracted using a rail assembly or other mechanism), fixably attached shelves, or a combination of these or others structures. In one embodiment, the entirety of theshelving structure 130 is comprised of a non-metallic material (e.g., plexiglass, plastic, etc.), withshelves 132 comprising a honeycomb (or other noncontiguous-type surface) surface on which objects are placed. One having ordinary skill in the art would understand that other configurations may be used, including solid shelves 132 (versus honey-combed), mixed material (e.g., substantially non-metallic shelves in combination with metallic material, two or more different non-metallic materials, etc.). Further, the surfaces of theshelves 132 may include shadow-boxing or other mechanisms to aid in distinguishing when objects are removed. - Located on one or more of the
shelves 132 may be one or more objects, such as objects 120 a-120 c. For instance, object 120 a may comprise a can of spray paint, object 120 b may comprise a tape measure, and object 120 c may comprise a hammer. In one embodiment, each of the objects 120 a-120 c includes an RFID tag 122 (herein, also tag(s) 122) affixed thereto. In some embodiments, thetags 122 may be integrated into each object 120 a-120 c. In some embodiments, thetags 122 may be affixed to switches (not shown) on which the objects 120 a-120 c rest, as explained further below. - In operation, when the locking
doors magnetic lock 110 engages, and the closed-door (or re-engagement in some embodiments) status is sensed or received by thecomputing system 200 a, enabling thecomputing system 200 a to resume the scanning process. That is, thecomputing system 200 a generates excitation signals (e.g., RF, though not limited to the defined radio frequency band as commonly defined in communications systems) that are emitted from T/R antennas enclosure 102 and impinge on thetags 122 as part of the scanning process. Transmitted signals (including reflected signals) sent by thetags 122 in response to the excitation signals are received at the T/R antennas computing system 200 a. Thecomputing system 200 a uses the processed data to identify objects present and missing from the enclosure, which is also part of the scanning process. That is, the signals received from thetags 122 are read by thecomputing system 200 a to determine the quantity oftags 122 currently located within theenclosure 102, from which a determination is made as to which tags are missing. The frequency of the scanning process is configurable, and in one embodiment, may occur at a rate of every 0.75 seconds while thedoors - A user attempting to gain access to the interior of the enclosure (e.g., to return an
object 120 a or retrieve anobject 120 b) undergoes an authentication process. In one embodiment, the user enters his or her name, and/or other identification, as explained above at the user interface 112 (e.g., at the GUI 130). If the user is authenticated (e.g., theobject tracking system 100 a confirms that this is a user that is authorized to access the interior of the enclosure 102), thecomputing system 200 a ceases the scan process and de-energizes the electro-magnetic lock 110, after which the authenticated user is able to open the locking door 106 (and if needed, locking door 108). Subsequently, the user either returns or retrieves one or more objects. - When the user closes the
doors doors magnetic lock 110, the closed-door in one embodiment is sensed bysensor 107, the status of which is communicated to thecomputing system 200 a, resulting in thecomputing system 200 a resuming the scanning process, which include the reading oftags 122 as explained above. By performing the reading of thetags 122 and comparing the inventory oftags 122 before and after the authenticated access, thecomputing system 200 a is able to determine what has been removed or added and provide an update through display of the status on theGUI 130 and/or elsewhere. For instance, thecomputing system 200 a renders the results on theGUI 130, which in one embodiment continuously displays an update of the status of objects associated with (e.g., objects removed and returned) theenclosure 102 by displaying which objects have been added or removed and the number of objects added to or removed from theenclosure 102. - In some embodiments, additional information displayed by the
GUI 130 or displayed or provided elsewhere may include the name and/or identification number of the user, the department to which the user is associated, among other information through cooperation with a data structure located in, or in communication with, thecomputing system 200 a. In some embodiments, the update of the status can be in the form of an audio (e.g., verbal or periodic sound) update in addition to or in lieu of the visual update. The scanning process continues until interrupted by the next authenticated access to the interior of theenclosure 102. -
FIG. 2A illustrates another embodiment of anobject tracking system 100 b. Similar scanning principles as described for theobject tracking system 100 a apply in thisembodiment 100 b as well, with differences described below. As shown, theobject tracking system 100 b comprises anenclosure 202 embodied as a drawer-type cabinet comprising one or more access members, also referred to herein individually or collectively asdrawers 204, that slidably move in and out of the enclosure (e.g., on rails). Each of the drawers comprises ahandle 206 that facilitates the opening of each drawer. Similar to that mentioned above, the opening and/or closing of each of thedrawers 204 may be automated in some embodiments. Theenclosure 202 also includes, without limitation, a sensor (not shown, but similar tosensor 107, positioned to detect the drawer closing and/or opening) and an electro-magnetic lock 210 that operates similarly to the electro-magnetic lock 110 shown in FIGS. 1A-lB. The electro-magnetic lock 210 is embodied as a spring-loaded hinge assembly that swivels open when de-energized. When energized, the electro-magnetic lock 210 prevents opening of the drawers 204 (e.g., by blocking the drawers 204). In some embodiments, thelock 210 may be alternately configured, such that de-energizing thelock 210 results in the denial of entry. - The
enclosure 202 further comprises T/R antennas FIG. 1B . In one embodiment, the T/R antennas enclosure 202 and the T/R antennas enclosure 202. Similar in manner to that mentioned above with regard to the quantity and configuration of T/R antennas FIG. 1B , one having ordinary skill in the art would understand that fewer or greater numbers of T/R antennas, in the same or different configuration may be used in some embodiments, including the use of a single T/R antenna. - The
object tracking system 100 b further comprises acomputing system 200 b, which includes acomputing device 502 coupled to a transceiver control 504 (obscured from view). Thecomputing device 502 further comprises adisplay 212 and processing hardware and software. Thedisplay 212 comprises aGUI 130 acting alone or in combination with a keyboard (not shown) or other user entry mechanism as described above to serve as a user interface, in similar manner to that described inFIGS. 1A-1B . - Referring to
FIG. 2B , a top-plan view of theobject tracking system 100 b is shown, with one of thedrawers 204 extended open. Thecomputing system 200 b comprises the transceiver control 504 (also referred to herein as transceiver control logic), as mentioned above, as well as akeyboard 216 associated with thecomputing device 502. Thetransceiver control 504 and at least portions of thecomputing device 502 collectively provide functionality of a reader. Various examples in the industry of reader technology can be used, including those found in U.S. Pat. Nos. 4,730,188 and 5,541,574, herein incorporated by reference in their entirety, and hence further discussion of the same is omitted for brevity. One having ordinary skill in the art can appreciate that, though shown as separate components, a reader may be used in some embodiments that can be embodied as a single device with or without an integrated display, among other configurations. - As shown, the electro-
magnetic lock 210 is in the swivel-open position via thecomputing system 200 a de-energizing thelock 210 in response to authenticating a user (and hence providing access to the interior of the enclosure 202). In the swivel-open position, a user is able to freely pull the drawer 204 (and other drawers) open. Thedrawer 204 is shown withseveral objects 120 d-120 f (e.g., hammer, pliers, tape measure, respectively) resting on asurface 220. Thesurface 220 comprises a mostly non-metallic surface, such as plastic, plexiglass, among other materials, which enables passage of the RF signals provided using the T/R antennas several drawers 204. In one embodiment, thesurface 220 can be solid, while in some embodiments, thesurface 220 may be of a honey-comb surface or the like, or a combination of both in some embodiments (as is true for the variety of surfaces that can be used for theshelves 132,FIG. 1B ). In one embodiment, the surface is configured with one or more shadowboxes (obscured from view by the objects) in which each object 120 d -120 f rests. - In one embodiment, each of the
objects 120 d -120 f rests on a member (hidden from view) of a corresponding switch 250 (described in association withFIGS. 4A-4B ), whereby eachswitch 250 includes a tag 122 (obscured from view). For instance, the weight of theobject 120 d -120 f causes theswitch 250 to open, resulting in the ability of a signal reflected from (or transmitted by) thetag 122 to be read by thecomputing system 200 b , which thecomputing system 200 b interprets as indicating a presence of the particular object in theenclosure 202. In contrast, the removal of theobject 120 d -120 f from a member of the switch results in the closure of theswitch 250, resulting in cancellation of the signal (e.g., via a metallic surface of theswitch 250 coming in contact with the tag 122), which, thecomputing system 200 b interprets as an object missing from theenclosure 204. - Although such a switch configuration can be referred to in electronics parlance as a normally closed (n.c.) state (where two members of the
switch 250, one having thetag 122, are in contact when unloaded), normally open (n.o.) configurations can be used whereby the state of the switch is interpreted differently by thecomputing system 200 b. Further explanation of various embodiments of theswitches 250 follows below in association withFIGS. 4A-4B . Additionally, one having ordinary skill in the art can recognize within the context of this disclosure that tags 122 may be attached to, or integrated with, the objects in addition to or in lieu of using theswitches 250 in some embodiments. - The operation of the
object tracking system 100 b is similar to that described for theobject tracking system 100 a. That is, thecomputing system 200 b implements a scanning operation continuously until authentication (or in some embodiments, responsive to opening of thedrawer 204 and/or disengagement of electro-magnetic lock 210), enabling the monitoring of inventory ofobjects 120 d -120 f in thedrawer 204. To gain access to the interior of the enclosure 202 (e.g., to access one or more ofobjects 120 d -120 f in at least one of the drawers 204), a user is authenticated through theGUI 130 and/or keyboard 216 (e.g., manual entry, or in some embodiments, a separate device may be used to enable the scanning of an ID code or the like as described above). Once authenticated, thecomputing system 200 b de-energizes the electro-magnetic lock 210, the lock swivels open, and the user is able to now gain access to contents in thedrawer 204. Also, at a time corresponding to authentication, thecomputing system 200 ceases the scanning process. In some embodiments, the cessation of the scanning process can be responsive to opening thedrawer 204 and/or responsive to unlocking the door (as opposed to opening of the door). - Once the user has completed access to one or more of the
drawers 204, the user closes the drawers, the drawers are automatically locked via the electro-magnetic lock 210, and the closure (and/or locking in some embodiments) is sensed and communicated to thecomputing system 200 b. Thecomputing system 200 b then resumes the scanning process to identify what objects have been removed from or returned to thedrawer 204, and provides an updated count (status update) of those objects on the GUI 130 (and/or remotely to other personnel or devices). The status update may be visual, audible, or a combination of both. -
FIG. 3 is another embodiment of anobject tracking system 100 c. Operation is similar to that described above for theobject tracking systems object tracking system 100 c comprises a combination of theenclosures enclosure 102 stacked upon theenclosure 202, although in some embodiments, the relative location ofenclosures computing system 200 c is shown included incap 114, and provides the operational functionality for the entire assembly, including authentication, the energizing/de-energizing of the electro-magnetic locks respective enclosure enclosures enclosures enclosure - The T/R antennas (not shown) may be positioned in similar manner in the
enclosure 102 as shown inFIG. 1 B . The T/R antennas (not shown) for theenclosure 202 may all be located at the interior bottom of theenclosure 202. Other T/R antenna configurations can be used, as explained above. Theuser interface 112 includes aGUI 130, and serves to provide, in cooperation with thecomputing system 200 c, authentication functionality for bothenclosures respective enclosure drawer 204, the scanning process may cease for theenclosure 202, but continue for the enclosure 102 (i.e., is independent), assuming lockingdoors doors drawers 204 results in a cessation of the scanning process (i.e., treated as a single entity) for the entire system. In some embodiments, the choice to operate in independent fashion or otherwise may be configurable by the user. -
FIGS. 4A and 4B are schematic diagrams that illustrate one embodiment of aswitch 250 a (also referred to herein as an RFID switch), configured as a rocker-type switch. TheRFID switch 250 a comprises afirst portion 402 hingably coupled at slotted connectingmembers second portion 406. Thefirst portion 402 comprises afirst member 408 in angular relation to asecond member 410. In one embodiment, the angle formed between thefirst member 408 and thesecond member 410 is approximately 135 degrees, though other angular dimensions may be used in some embodiments. Thesecond member 410 also comprises twostubs second member 410. The twostubs members first member 408 to rotate from an approximately 45 degree angle (unloaded position) with respect to a planar surface (e.g.,surface 220 of drawer 204) on which theswitch 250 a rests, to a position whereby thefirst member 408 comes to loaded rest on the surface or slightly above the surface, the loaded ending position depending on the object geometry. The weight of thesecond member 410 is greater than the unloaded weight of thefirst member 408. Thus, when an object is removed from thefirst member 408, the first member automatically rotates back to the angled position of approximately 45 degrees with respect to the planar surface. In some embodiments, the bias provided by the difference in weight can be replaced with a spring or other biasing mechanisms. - The
second member 410 also comprises afirst surface 414 that, when theswitch 250 a is unloaded (no object placed on the first member 408), lies adjacent to asecond surface 418 of thesecond portion 406. Thefirst surface 414 comprises, in a defined area located approximately centrally on thefirst surface 414, a material (herein, disabling material) that cancels or otherwise disables signals surrounding thetag 122 located on thesecond surface 418, thus disabling any ability to read the tag at thecomputing system first surface 414. In some embodiments, the disabling material may be affixed to thefirst surface 414, directly or through an intermediary material. The disabling material may be comprised of a metallic material, including aluminum foil, and may comprise an area substantially equal to the area of thetag 122, or may be configured as an outline trace of approximately equal length of each side-edge of atag 122. In some embodiments, the disabling material may comprise a fluid, such as water, that is enclosed in a plastic package affixed to thefirst surface 414, or integrated within thefirst surface 414 in some embodiments. Any disabling material may be used that cancels the surrounding signals of thetag 122 or otherwise renders the signals surrounding thetag 122 ineffective for purposes of reading the response signals. - As mentioned above, the
second portion 406 comprises thesecond surface 418, upon which (or integrated within) atag 122 is located. Though shown located centrally on thesecond surface 418 and encompassing an area as shown that is substantially smaller than the area of thesecond surface 418, it can be appreciated that thetag 122 can be located elsewhere on the second surface 418 (and hence the disabling material on thefirst surface 414 is likewise positioned such that when theswitch 250 a is unloaded, the disabling material is substantially coincident with the location of the tag 122). Further, thetag 122 may have different relative dimensions with respect to thesecond surface 418 than that shown inFIG. 4B . Thesecond portion 406 also comprises fourlegs 414 that rest on the planar surface of the drawer or shelf of the enclosure. In some embodiments, thelegs 414 can be configured with an adhesive that stick to the planar surface of the drawer or shelf, or comprise sharpened or pointed bottom surfaces that puncture the planar surface, enabling resistance to movement when placed on the planar surface. Other mechanisms for resisting movement may be used, as can be appreciated by one having ordinary skill in the art. - In one embodiment, the
switch 250 a is comprised of a substantially non-metal material (e.g., plastic, rubber, wood, graphite, etc.), with at least a portion of the first surface 414 (the area where the disabling material is positioned) comprised of a metallic material or other material that causes an inability (by thecomputing system FIGS. 4A-4B for purposes of brevity) to read thetag 122. By providing the disabling material at, or affixed to, thefirst surface 414, the state of eachtag 122 can be altered (and hence determined and/or controlled) based on the position of theswitch 250 a, hence assisting in the determination of whether an object is present in an enclosure or not. - In some embodiments, actual contact between the
tag 122 and the disabling material need not be made to cause an inability to read thetag 122, depending on the size of thetag 122, the strength and angle of incidence of the excitation signal, environmental influences (e.g., interference) within an enclosure, among other factors. For instance, in one embodiment without limitation, where the “footprint” of theswitch 250 a is approximately the size of a dime, the separation distance between thetag 122 and the disabling material may be approximately up to 0.125 inches to disable thetag 122, depending on the surrounding environment, angle of incidence, among other factors. - Summarizing the operation of the
switch 250 a, an object placed on the first member 408 (not shown) causes thefirst member 408 to rotate in the direction of the gravitational force resulting from the weight of the object due in part to the rotational movement enabled by the connectingmembers first surface 414 comprising the disabling material and thesecond surface 418 comprising thetag 122, hence exposing thetag 122 to excitation signals delivered from thecomputing system 200 b as well as enabling the transmission (including reflection) of response signals by thetag 122 back to thecomputing system 200 b to enable read functionality. Hence, when loaded by an object, theswitch 250 a movement causes thetag 122 to possess a first state that allows for reading of the tag 122 (e.g., thecomputing system 200 b can determine that the object is present in the enclosure). - When the object is removed from the
first member 408, the unloading of the object causes a “rocker” motion whereby thefirst member 408 returns to the unloaded position and thesecond member 410, connected to thefirst member 408, returns to rest upon thesecond portion 406. By returning to this resting or unloaded position, thetag 122 is in contact with the disabling material residing on thefirst surface 414, which renders any attempt at reading thetag 122 ineffective. Thus, the unloading of theswitch 250 a commences a second state for thetag 122, whereby thetag 122 cannot be read by thecomputing system 200 b (e.g., due to cancellation or otherwise of signals due to proximity of thetag 122 to the disabling material). In the second state, thecomputing system 200 b can determine that the object is missing, for instance by comparison to an expected object inventory or object count. - It can be appreciated by one having ordinary skill in the art, in the context of this disclosure, that other switching mechanisms (e.g., spring-loaded switches, mercury-type switches, etc.) may be employed in a manner whereby loading and unloading by an object responsively changes the proximity of a
tag 122 to a disabling material, and hence changes the state of thetag 122 for purposes of detection by thecomputing system - Referring now to an embodiment of computing system 200 (which comprises functionality of
embodiments FIG. 5 , thecomputing system 200 comprises thecomputing device 502 that is electrically coupled to and controls user interface 112 (oruser interface 212, the latter omitted from discussion hereinafter for brevity), electro-magnetic lock 110 (or 210, the latter omitted from discussion hereinafter for brevity), andsensor 107. Thecomputing device 502 is also coupled totransceiver control 504, which comprises well-known transmitter and receiver functionality that is electrically coupled to one or more antennas, such as T/R antennas transceiver control 504 wirelessly receives and processes (e.g., demodulates, decodes, etc.) signals fromtags 122 that are attached to or integrated with objects (or attached to or integrated with switches associated with the objects) located within an enclosure (e.g.,enclosure transceiver control 504 and portions of thecomputing device 502 comprise areader 506, which in one embodiment, collectively performs the scanning processes described herein. Although shown as separate modules, the functionality of thetransceiver control 506 and reading and control functionality (e.g., software, firmware, etc.) of thecomputing device 502 can be integrated into a single device, such as an applications specific integrated circuit (ASIC) or other processing device. Thecomputing device 502 receives the information corresponding to the received radio frequency signals (e.g., decoded data) from thetransceiver control 504, and tracks and monitors the inventory of objects within an enclosure. - The
computing device 502 is further configured to control power through cooperation withpower source 508 to electro-magnetic locks 110, which through user interface devices 606 (FIG. 6 ) effectuates the locking or unlocking of the lockingdoors user interface 112. That is, thecomputing device 502 is used to determine, based on information obtained viauser interface 112, whether a user is authorized to access the interior of the enclosure (e.g.,enclosures 102, 202), and then controls access to the enclosure. In some embodiments, thepower source 508 can be located remotely from thecomputing system 200. Thesensor 107 communicates status of door closing and/or opening to thecomputing device 502, such as via polling mechanisms employed by thecomputing device 502 or through active transmission of status information to thecomputing device 502. - In some embodiments, the
computing system 200 can be communicatively coupled to aremote computing device 512 via anetwork 510 so that the object tracking system 100 a-100 c can communicate with theremote computing device 512. Theremote computing device 512 can transmit new or updated user information, cost account information, security information, replenishment information, and inventory information to thecomputing system 200. Thecomputing system 200 can transmit monitored and tracked information to theremote computing device 512, enabling the information or object inventory information to be stored and/or monitored at a second location. -
FIG. 6 is a block diagram that illustrates an embodiment of an architecture for thecomputing device 502 shown inFIG. 5 . As indicated inFIG. 5 , thecomputing device 502 comprises aprocessing device 602,memory 604, one or more user interface devices 606, one or more I/O devices 608, and one ormore networking devices 610, each of which is connected to alocal interface 612. Theprocessing device 602 can include any custom made or commercially available processor, a central processing unit (CPU) or an auxiliary processor among several processors associated with thecomputing device 502, a semiconductor based microprocessor (in the form of a microchip), or a macroprocessor. Thememory 604 can include any one or a combination of volatile memory elements (e.g., random access memory (RAM, such as DRAM, SRAM, etc.)) and nonvolatile memory elements (e.g., ROM, hard drive, tape, CDROM, etc.). - The one or more user interface devices 606 comprise those components with which the user can interact with the
computing device 502, such asuser interface 112. Further, user interface devices 606 may also work in cooperation with GUI-display rendering software resident in the memory 604 (e.g., as part ofreader logic 616,authentication logic 618, or as a separate module). Where thecomputing device 502 comprises a server computer or similar device, these components can comprise those typically used in conjunction with a PC such as a keyboard and mouse. - The one or more I/
O devices 608 comprise components used to facilitate connection of thecomputing device 502 to other devices, for instance, one or more serial, parallel, small system interface (SCSI), universal serial bus (USB), or IEEE 1394 (e.g., Firewire™) connection elements, among other elements. The I/O devices also generically represent various components (and corresponding connections and/or interfaces) shown in and described in association withFIG. 5 , including thepower source 508, electro-magnetic locks sensor 107. Thenetworking devices 610 comprise the various components used to transmit and/or receive data over anetwork 510, where provided. By way of example, thenetworking devices 610 include a device that can communicate both inputs and outputs, for instance, a modulator/demodulator (e.g., modem), a radio frequency (RF) or infrared (IR) transceiver, a telephonic interface, a bridge, a router, as well as a network card, etc. - The
memory 604 normally comprises various programs (in software and/or firmware) including an operating system (O/S) 614,reader logic 616,authentication logic 618, objectdata structure 620, and authorized user data structure 622. Other software not shown includes logic (e.g., data structures and/or programming code) to assist in inventory management. The O/S 614 controls the execution of programs, including thereader logic 616,authentication logic 618, objectdata structure 620, and authorized user data structure 622, and provides scheduling, input-output control, file and data management, memory management, and communication control and related services. - The
reader logic 616 controls the scanning process described herein. Accordingly, thereader logic 616 effects the generation and transmission of excitation signals from thetransceiver control 504 and provides for the reading and interpretation of data corresponding to response signals received fromtags 122 by thetransceiver control 504 to determine whether an object has been returned or removed. After an enclosure is closed (or locked in some embodiments), thereader logic 616 implements, in cooperation with thetransceiver control 504, scanning of the interior of the enclosure, and compares the received tag information (e.g., serial number data) with expected tag information (e.g., serial number data) stored in the object data structure 620 (which in one embodiment, comprises a database of identifying information corresponding to objects (and their associated tags) that are expected to be in the enclosure in view of a previous association process with associated tags of that enclosure). Based on the comparison, thereader logic 616 determines whether an object has been removed or returned. Thereader logic 616 also provides for functionality involved in associatingtags 122 to objects, including the provision of various GUIs that are provided at start-up or responsive to object updates (e.g., new objects to enter into an enclosure or remove obsolete objects) to enable a user to accomplish association to objects and populate theobject data structure 620 with data corresponding to the new objects. - The
authentication logic 618 controls access to an enclosure in cooperation with theuser interface 112 and receives information via theuser interface 112 and electro-magnetic lock 110. That is, when an enclosure is locked, and a user seeks access to the enclosure, the user enters information at theuser interface 112. Upon receipt of user information, theauthentication logic 618 compares the entered information (e.g., one or more of name, pin number, password, social security number, biometric data, etc.) with information in the authorized user data structure 622 (which in one embodiment, comprises a database of identification information for personnel that are permitted to access objects from within an enclosure). If a match is found, theauthentication logic 618 signals the electro-magnetic lock 110 to disengage and hence allow access by that individual to the interior of the enclosure. If a match is not found, theauthentication logic 618 maintains engagement of the electro-magnetic locks - The
reader logic 616 andauthentication logic 618 can be implemented in hardware, software, firmware, or a combination thereof. In one embodiment, thereader logic 616 andauthentication logic 618 are implemented in software that is stored in a memory and that is executed by a suitable instruction execution system. If implemented in hardware, as in an alternative embodiment, the functionality of thereader logic 616 andauthentication logic 618 can be implemented with any or a combination of the following technologies, which are all well known in the art: a discrete logic circuit(s) having logic gates for implementing logic functions upon data signals, an application specific integrated circuit (ASIC) having appropriate combinational logic gates, a programmable gate array(s) (PGA), a field programmable gate array (FPGA), etc. - The
reader logic 616 andauthentication logic 618, which in one embodiment comprises an ordered listing of executable instructions for implementing logical functions, can be embodied in any computer-readable medium for use by or in connection with an instruction execution system, apparatus, or device, such as a computer-based system, processor-containing system, or other system that can fetch the instructions from the instruction execution system, apparatus, or device and execute the instructions. - Having described various embodiments of object tracking systems 100 a-100 c, it can be appreciated by one having ordinary skill in the art in the context of this disclosure that one method embodiment, referred to
method 618 a and shown inFIG. 7 , enables authentication of a user to enable or deny access to the interior of an enclosure. Such amethod 618 a, implemented in one embodiment by theauthentication logic 618, comprises receiving user identifying information entered by a user at theuser interface 112 according to one or more of the mechanisms described above (702). Further, themethod 618 a determines, based on querying an authorized user data structure 622, whether the user is authorized to access the interior of a particular enclosure (704). If the user is not authorized to access the interior of the enclosure, themethod 618 a denies access (706). Such a denial can take the form of the maintenance of an engagement signal to the electro-magnetic lock 110 (or in other configurations, abstaining from sending a signal to disengage the lock 110), and optionally one or more of the following: a message sent to theGUI 130 that alerts the user that access is denied, an alert sent to an administrator located remotely of an unauthorized attempt at access, among others. - If the user is authorized to access the interior of the enclosure, the
method 618 a permits access to the interior of the enclosure by signaling to the electro-magnetic lock 110 to unlock the door(s) and/or drawer(s) of the enclosure to enable access (708). Themethod 618 a also signals to the reader logic 616 (responsive to communication by sensor 107) that authentication has been achieved, which prompts thereader logic 616 to cease the scanning process (710). In some embodiments, the cessation of the scanning process is prompted by disengagement (unlocking) or the actual opening (as opposed to unlocking) of a drawer or door of the enclosure as sensed by a sensor 107 (or current sensor), which communicates the change in opening/closing status to thereader logic 616. In some embodiments, theauthentication logic 618, through cooperation with the user interface device 606, senses the disengagement (e.g., via well-known current sensing capabilities) of thelock 110, and communicates the change in status to thereader logic 616 to enable the cessation of the scanning process. In some embodiments, thereader logic 616 senses the disengagement through cooperation with the user interface device 606. - The resumption of scanning occurs according to the mechanisms described above. In one embodiment, the
sensor 107 senses door closure, and communicates this status to thereader logic 616, which commences the scan process. - Having described various embodiments of object tracking systems 100 a-100 c, it can be appreciated by one having ordinary skill in the art in the context of this disclosure that one scanning method embodiment for a given enclosure, referred to
method 508 a and shown inFIG. 8 , can be implemented by thereader logic 616 in cooperation with the transceiver control 504 (the latter two components collectively also referred to as a reader 508). Themethod 508 a comprises, responsive to sensing or receiving status information corresponding to the door(s) and/or drawers(s) of an enclosure being closed (or locked in some embodiments), commencing transmitting excitation signals to one or more tags 122 (802). Themethod 508 a further comprises receiving response signals from the one or more tags 122 (804), and comparing information pertaining to the response signals with information in anobject data structure 620 comprising information about objects and associatedtags 122 expected to be located in the enclosure (806). Themethod 508 a further comprises, responsive to the comparison, determining which tags 122 are present in the enclosure and which tags have been removed (808). Themethod 508 a further comprises providing feedback of the status of objects associated with the enclosure (810). Themethod 508 a repeats the aforementioned process until the door(s) and/or drawer(s) are opened upon successful authentication to the interior of the enclosure, unlocking of the door(s) and/or drawer(s), or successful authentication. - It can be appreciated in the context of the above disclosure that one method embodiment, referred to as
object tracking method 100 d and shown inFIG. 9 , comprises scanning an interior space of an enclosure, the enclosure having at least one radio frequency identification (RFID) tag and at least one object associated with the at least one RFID tag (902), receiving an indication that a user is attempting access to the interior space (904), and responsive to receiving the indication, determining whether access to the interior space is permitted by the user (906). - Any process descriptions or blocks in flow charts should be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps in the process, and alternate implementations are included within the scope of the preferred embodiment of the present disclosure in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present disclosure. Further, though described in the context of the specific architectures described in
FIGS. 1A-6 , it can be appreciated in the context of this disclosure that the various methods described herein are not limited to the structures illustrated inFIGS. 1A-6 . - It should be emphasized that the above-described embodiments are merely possible examples of implementations, merely set forth for a clear understanding of the principles of the disclosure. Many variations and modifications may be made to the above-described embodiment(s) without departing substantially from the spirit and principles of the disclosed systems and methods. All such modifications and variations are intended to be included herein within the scope of this disclosure and protected by the following claims.
Claims (25)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/622,827 US7669765B2 (en) | 2004-04-23 | 2007-01-12 | RFID switching |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US56508904P | 2004-04-23 | 2004-04-23 | |
US10/990,907 US7337963B2 (en) | 2004-04-23 | 2004-11-17 | Portal system for a controlled space |
US11/622,827 US7669765B2 (en) | 2004-04-23 | 2007-01-12 | RFID switching |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/990,907 Continuation-In-Part US7337963B2 (en) | 2004-04-23 | 2004-11-17 | Portal system for a controlled space |
Publications (2)
Publication Number | Publication Date |
---|---|
US20070115127A1 true US20070115127A1 (en) | 2007-05-24 |
US7669765B2 US7669765B2 (en) | 2010-03-02 |
Family
ID=46327045
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/622,827 Active 2026-03-02 US7669765B2 (en) | 2004-04-23 | 2007-01-12 | RFID switching |
Country Status (1)
Country | Link |
---|---|
US (1) | US7669765B2 (en) |
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080120200A1 (en) * | 2006-10-19 | 2008-05-22 | George Michael Hurtis | Method and system for automatic inventory variance identification |
FR2913789A1 (en) * | 2007-03-07 | 2008-09-19 | Alain Jean Pierre Jacot | DEVICE FOR TRACKING BOWLING SHOES ON RENT |
US20100277277A1 (en) * | 2009-04-29 | 2010-11-04 | Job Site Resources, Llc | Mobile tool facility |
US20110178630A1 (en) * | 2010-01-15 | 2011-07-21 | Job Site Resources, Llc | Portable asset dispensing device |
US20130162403A1 (en) * | 2011-12-27 | 2013-06-27 | Grant Edward Striemer | Apparatus and Method for Providing Product Information |
US20140146510A1 (en) * | 2012-11-29 | 2014-05-29 | Ebay Inc. | Portable mechanical switch for selective deactivation of radio frequency identification circuits |
WO2015121738A1 (en) * | 2014-02-17 | 2015-08-20 | Sam Outillage | Item, notably tool, storage and stock control using wireless means of rfid type, notably of rfid chip and switch type |
US9123224B2 (en) | 2011-06-01 | 2015-09-01 | Jobsite Resources, Llc | Mobile perimeter access security system |
US9235740B1 (en) * | 2014-12-15 | 2016-01-12 | Amazon Technologies, Inc. | Automatic drawer state detection |
US20160105735A1 (en) * | 2013-04-23 | 2016-04-14 | Thomson Licensing | Electrical activity sensor device for detecting electrical activity and electrical activity monitoring apparatus |
US9466198B2 (en) | 2013-02-22 | 2016-10-11 | Milwaukee Electric Tool Corporation | Wireless tracking of power tools and related devices |
US9467862B2 (en) | 2011-10-26 | 2016-10-11 | Milwaukee Electric Tool Corporation | Wireless tracking of power tools and related devices |
WO2017023735A1 (en) * | 2015-07-31 | 2017-02-09 | Stanley Industrial And Automotive, Llc. | Rotary rfid switch |
US20170124790A1 (en) * | 2015-10-31 | 2017-05-04 | Disney Enterprises, Inc. | High-q and over-coupled near-field rfid reader antenna for improved tag read range |
EP3176763A1 (en) * | 2015-12-04 | 2017-06-07 | Apfel GmbH | Device and method for storing and dispensing control |
WO2017141164A1 (en) * | 2016-02-16 | 2017-08-24 | Sato Holdings Kabushiki Kaisha | An inventory control system and a method of controlling inventory |
US10158213B2 (en) | 2013-02-22 | 2018-12-18 | Milwaukee Electric Tool Corporation | Worksite power distribution box |
DE102019102685A1 (en) * | 2019-02-04 | 2020-08-06 | Aesculap Ag | System, devices and methods for identifying a medical tool |
US11569582B2 (en) * | 2019-07-02 | 2023-01-31 | Stanley Black & Decker Mea Fze | Slot antenna in a RFID storage |
Families Citing this family (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090134221A1 (en) * | 2000-11-24 | 2009-05-28 | Xiaoxun Zhu | Tunnel-type digital imaging-based system for use in automated self-checkout and cashier-assisted checkout operations in retail store environments |
US7242300B1 (en) * | 2004-08-27 | 2007-07-10 | Evolution Robotics Retail, Inc. | Shopping cart |
US9153083B2 (en) | 2010-07-09 | 2015-10-06 | Isonas, Inc. | System and method for integrating and adapting security control systems |
US7775429B2 (en) | 2006-08-16 | 2010-08-17 | Isonas Security Systems | Method and system for controlling access to an enclosed area |
US11557163B2 (en) | 2006-08-16 | 2023-01-17 | Isonas, Inc. | System and method for integrating and adapting security control systems |
US9589400B2 (en) | 2006-08-16 | 2017-03-07 | Isonas, Inc. | Security control and access system |
US8274390B2 (en) | 2006-11-20 | 2012-09-25 | Metrologic Instruments, Inc. | Radio frequency identification antenna switching in a conveyor system |
US9322151B2 (en) | 2012-10-25 | 2016-04-26 | International Business Machines Corporation | Shower head controller |
WO2017143093A1 (en) | 2016-02-16 | 2017-08-24 | Golock Technology, Inc. | Portable lock with integrity sensors |
US10778285B2 (en) | 2017-01-04 | 2020-09-15 | Go Lock Technology, Inc. | Cable with integral sensing elements for fault detection |
US10544605B2 (en) | 2017-05-19 | 2020-01-28 | Douglas A. Yates | Sliding lockable housing with supplemental openings |
Citations (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4750188A (en) * | 1986-09-08 | 1988-06-07 | Mannesmann Ag | Electrode arrangement for electroarc or reducing furnaces |
US5541574A (en) * | 1993-12-22 | 1996-07-30 | Palomar Technologies Corporation | Transponder system for communicating with a vehicle tire |
US5693134A (en) * | 1994-12-29 | 1997-12-02 | Merck Patent Gesellschaft Mit Beschrankter Haftung | Gray interference pigment and process for producing the same |
US5812838A (en) * | 1997-03-13 | 1998-09-22 | International Business Machines Corporation | Branch history table |
US6127938A (en) * | 1999-02-12 | 2000-10-03 | Privacy Shield L.L.C. | Adjustable shield for vehicle mounted toll collection identifier |
US6182053B1 (en) * | 1996-03-26 | 2001-01-30 | Recovery Sales Corporation | Method and apparatus for managing inventory |
US6195006B1 (en) * | 1997-07-24 | 2001-02-27 | Checkpoint Systems Inc. | Inventory system using articles with RFID tags |
US20020118111A1 (en) * | 2000-11-03 | 2002-08-29 | Suzy Brown | Method and apparatus for associating the movement of goods with the identity of an individual moving the goods |
US20020183882A1 (en) * | 2000-10-20 | 2002-12-05 | Michael Dearing | RF point of sale and delivery method and system using communication with remote computer and having features to read a large number of RF tags |
US20020198795A1 (en) * | 2000-07-25 | 2002-12-26 | Dorenbosch Jheroen Pieter | Home inventory management system and method |
US20030034390A1 (en) * | 2000-10-20 | 2003-02-20 | Linton William A. | Radio frequency identification method and system of distributing products |
US6549891B1 (en) * | 1996-03-26 | 2003-04-15 | Recovery Management Corporation | Method for managing inventory |
US20030116634A1 (en) * | 2001-11-29 | 2003-06-26 | Masahiko Tanaka | Non-contact IC card |
US6596200B1 (en) * | 1999-06-30 | 2003-07-22 | Taiyo Yuden Co., Ltd. | Electronic material composition, electronic parts and use of electronic material composition |
US6681990B2 (en) * | 2002-05-31 | 2004-01-27 | Sap Aktiengesellschaft | Item tracking systems and real-time inventory management |
US6708879B2 (en) * | 2001-11-16 | 2004-03-23 | Audio Visual Services Corporation | Automated unmanned rental system and method |
US6812838B1 (en) * | 2001-04-26 | 2004-11-02 | Key-Trak, Inc. | Key control system using separate ID and location detection mechanisms |
US20050242950A1 (en) * | 2004-04-30 | 2005-11-03 | Kimberly-Clark Worldwide, Inc. | Activating a data tag by load or orientation or user control |
US20060139180A1 (en) * | 2004-09-24 | 2006-06-29 | Smith Joshua R | Switch status and RFID tag |
US7518516B2 (en) * | 2006-03-27 | 2009-04-14 | Neology, Inc. | Systems and methods for managing inventory of items held in a cabinet using radio frequency identification (RFID) |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPS60171475A (en) | 1984-02-15 | 1985-09-04 | アイデンティフィケ−ション・デバイセス・インコ−ポレ−テッド | Discriminating system |
US20070023193A1 (en) | 2003-09-17 | 2007-02-01 | King Roy D | Inventory control system |
-
2007
- 2007-01-12 US US11/622,827 patent/US7669765B2/en active Active
Patent Citations (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4750188A (en) * | 1986-09-08 | 1988-06-07 | Mannesmann Ag | Electrode arrangement for electroarc or reducing furnaces |
US5541574A (en) * | 1993-12-22 | 1996-07-30 | Palomar Technologies Corporation | Transponder system for communicating with a vehicle tire |
US5693134A (en) * | 1994-12-29 | 1997-12-02 | Merck Patent Gesellschaft Mit Beschrankter Haftung | Gray interference pigment and process for producing the same |
US6549891B1 (en) * | 1996-03-26 | 2003-04-15 | Recovery Management Corporation | Method for managing inventory |
US6182053B1 (en) * | 1996-03-26 | 2001-01-30 | Recovery Sales Corporation | Method and apparatus for managing inventory |
US5812838A (en) * | 1997-03-13 | 1998-09-22 | International Business Machines Corporation | Branch history table |
US6195006B1 (en) * | 1997-07-24 | 2001-02-27 | Checkpoint Systems Inc. | Inventory system using articles with RFID tags |
US20010000019A1 (en) * | 1997-07-24 | 2001-03-15 | Bowers John H. | Inventory system using articles with RFID tags |
US6693539B2 (en) * | 1997-07-24 | 2004-02-17 | Checkpoint Systems, Inc. | Inventory system using articles with RFID tags |
US6127938A (en) * | 1999-02-12 | 2000-10-03 | Privacy Shield L.L.C. | Adjustable shield for vehicle mounted toll collection identifier |
US6596200B1 (en) * | 1999-06-30 | 2003-07-22 | Taiyo Yuden Co., Ltd. | Electronic material composition, electronic parts and use of electronic material composition |
US20020198795A1 (en) * | 2000-07-25 | 2002-12-26 | Dorenbosch Jheroen Pieter | Home inventory management system and method |
US20030034390A1 (en) * | 2000-10-20 | 2003-02-20 | Linton William A. | Radio frequency identification method and system of distributing products |
US20020183882A1 (en) * | 2000-10-20 | 2002-12-05 | Michael Dearing | RF point of sale and delivery method and system using communication with remote computer and having features to read a large number of RF tags |
US20020118111A1 (en) * | 2000-11-03 | 2002-08-29 | Suzy Brown | Method and apparatus for associating the movement of goods with the identity of an individual moving the goods |
US6812838B1 (en) * | 2001-04-26 | 2004-11-02 | Key-Trak, Inc. | Key control system using separate ID and location detection mechanisms |
US6708879B2 (en) * | 2001-11-16 | 2004-03-23 | Audio Visual Services Corporation | Automated unmanned rental system and method |
US20030116634A1 (en) * | 2001-11-29 | 2003-06-26 | Masahiko Tanaka | Non-contact IC card |
US6681990B2 (en) * | 2002-05-31 | 2004-01-27 | Sap Aktiengesellschaft | Item tracking systems and real-time inventory management |
US20050242950A1 (en) * | 2004-04-30 | 2005-11-03 | Kimberly-Clark Worldwide, Inc. | Activating a data tag by load or orientation or user control |
US20060139180A1 (en) * | 2004-09-24 | 2006-06-29 | Smith Joshua R | Switch status and RFID tag |
US7518516B2 (en) * | 2006-03-27 | 2009-04-14 | Neology, Inc. | Systems and methods for managing inventory of items held in a cabinet using radio frequency identification (RFID) |
Cited By (48)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8280784B2 (en) * | 2006-10-19 | 2012-10-02 | International Business Machines Corporation | automatic inventory variance identification |
US9576265B2 (en) | 2006-10-19 | 2017-02-21 | International Business Machines Corporation | Automatic inventory variance identification |
US20080120200A1 (en) * | 2006-10-19 | 2008-05-22 | George Michael Hurtis | Method and system for automatic inventory variance identification |
FR2913789A1 (en) * | 2007-03-07 | 2008-09-19 | Alain Jean Pierre Jacot | DEVICE FOR TRACKING BOWLING SHOES ON RENT |
WO2008132316A2 (en) * | 2007-03-07 | 2008-11-06 | Alain Jean-Pierre Jacot | Device for tracking bowling shoes identified by means of rfid |
WO2008132316A3 (en) * | 2007-03-07 | 2009-05-28 | Alain Jean-Pierre Jacot | Device for tracking bowling shoes identified by means of rfid |
US20100277277A1 (en) * | 2009-04-29 | 2010-11-04 | Job Site Resources, Llc | Mobile tool facility |
US8686831B2 (en) | 2009-04-29 | 2014-04-01 | Job Site Resources, Llc | Mobile tool facility |
US8570169B2 (en) | 2010-01-15 | 2013-10-29 | Job Site Resources, Llc | Portable asset dispensing device |
US20110178630A1 (en) * | 2010-01-15 | 2011-07-21 | Job Site Resources, Llc | Portable asset dispensing device |
US9123224B2 (en) | 2011-06-01 | 2015-09-01 | Jobsite Resources, Llc | Mobile perimeter access security system |
US10237742B2 (en) | 2011-10-26 | 2019-03-19 | Milwaukee Electric Tool Corporation | Wireless tracking of power tools and related devices |
US10531304B2 (en) | 2011-10-26 | 2020-01-07 | Milwaukee Electric Tool Corporation | Wireless tracking of power tools and related devices |
US12089047B2 (en) | 2011-10-26 | 2024-09-10 | Milwaukee Electric Tool Corporation | Wireless tracking of power tools and related devices |
US11159942B2 (en) | 2011-10-26 | 2021-10-26 | Milwaukee Electric Tool Corporation | Wireless tracking of power tools and related devices |
US11937086B2 (en) | 2011-10-26 | 2024-03-19 | Milwaukee Electric Tool Corporation | Wireless tracking of power tools and related devices |
US9467862B2 (en) | 2011-10-26 | 2016-10-11 | Milwaukee Electric Tool Corporation | Wireless tracking of power tools and related devices |
US11871232B2 (en) | 2011-10-26 | 2024-01-09 | Milwaukee Electric Tool Corporation | Wireless tracking of power tools and related devices |
US20130162403A1 (en) * | 2011-12-27 | 2013-06-27 | Grant Edward Striemer | Apparatus and Method for Providing Product Information |
US9572292B2 (en) | 2012-11-29 | 2017-02-14 | Paypal, Inc. | Portable mechanical switch for selective deactivation of radio frequency identification circuits |
US9135548B2 (en) * | 2012-11-29 | 2015-09-15 | Paypal, Inc. | Portable mechanical switch for selective deactivation of radio frequency identification circuits |
US20140146510A1 (en) * | 2012-11-29 | 2014-05-29 | Ebay Inc. | Portable mechanical switch for selective deactivation of radio frequency identification circuits |
US9466198B2 (en) | 2013-02-22 | 2016-10-11 | Milwaukee Electric Tool Corporation | Wireless tracking of power tools and related devices |
US11749975B2 (en) | 2013-02-22 | 2023-09-05 | Milwaukee Electric Tool Corporation | Worksite power distribution box |
US10727653B2 (en) | 2013-02-22 | 2020-07-28 | Milwaukee Electric Tool Corporation | Worksite power distribution box |
US10631120B2 (en) | 2013-02-22 | 2020-04-21 | Milwaukee Electric Tool Corporation | Wireless tracking of power tools and related devices |
US9949075B2 (en) | 2013-02-22 | 2018-04-17 | Milwaukee Electric Tool Corporation | Wireless tracking of power tools and related devices |
US10285003B2 (en) | 2013-02-22 | 2019-05-07 | Milwaukee Electric Tool Corporation | Wireless tracking of power tools and related devices |
US10158213B2 (en) | 2013-02-22 | 2018-12-18 | Milwaukee Electric Tool Corporation | Worksite power distribution box |
US20160105735A1 (en) * | 2013-04-23 | 2016-04-14 | Thomson Licensing | Electrical activity sensor device for detecting electrical activity and electrical activity monitoring apparatus |
US10003863B2 (en) * | 2013-04-23 | 2018-06-19 | Thomson Licensing | Electrical activity sensor device for detecting electrical activity and electrical activity monitoring apparatus |
FR3017643A1 (en) * | 2014-02-17 | 2015-08-21 | Sam Outil | MANAGING THE STORAGE AND STORAGE OF OBJECTS, IN PARTICULAR TOOLS, BY RFID-TYPE WIRELESS MEANS, ESPECIALLY OF BREAKER TYPE AND RFID CHIP |
WO2015121738A1 (en) * | 2014-02-17 | 2015-08-20 | Sam Outillage | Item, notably tool, storage and stock control using wireless means of rfid type, notably of rfid chip and switch type |
US9589162B1 (en) | 2014-12-15 | 2017-03-07 | Amazon Technologies, Inc. | Automatic drawer state detection |
US10078814B1 (en) | 2014-12-15 | 2018-09-18 | Amazon Technologies, Inc. | Location from RFID tag and RFID tuner interaction |
US9953290B1 (en) | 2014-12-15 | 2018-04-24 | Amazon Technologies, Inc. | Wearable tuning surfaces for activating RFID buttons or controls |
US9235740B1 (en) * | 2014-12-15 | 2016-01-12 | Amazon Technologies, Inc. | Automatic drawer state detection |
US9600699B1 (en) | 2014-12-15 | 2017-03-21 | Amazon Technologies, Inc. | Wearable tuning surfaces for activating RFID buttons or controls |
US10679112B2 (en) | 2015-07-31 | 2020-06-09 | Stanley Industrial And Automotive, Llc. | Rotary RFID switch |
WO2017023735A1 (en) * | 2015-07-31 | 2017-02-09 | Stanley Industrial And Automotive, Llc. | Rotary rfid switch |
US20170124790A1 (en) * | 2015-10-31 | 2017-05-04 | Disney Enterprises, Inc. | High-q and over-coupled near-field rfid reader antenna for improved tag read range |
US10102697B2 (en) * | 2015-10-31 | 2018-10-16 | Disney Enterprises, Inc. | High-Q and over-coupled near-field RFID reader antenna for improved tag read range |
EP3176763A1 (en) * | 2015-12-04 | 2017-06-07 | Apfel GmbH | Device and method for storing and dispensing control |
US11062097B2 (en) | 2016-02-16 | 2021-07-13 | Sato Holdings Kabushiki Kaisha | Inventory control system and a method of controlling inventory |
WO2017141164A1 (en) * | 2016-02-16 | 2017-08-24 | Sato Holdings Kabushiki Kaisha | An inventory control system and a method of controlling inventory |
US11759288B2 (en) | 2019-02-04 | 2023-09-19 | Aesculap Ag | System, devices, and method for identifying a medical tool |
DE102019102685A1 (en) * | 2019-02-04 | 2020-08-06 | Aesculap Ag | System, devices and methods for identifying a medical tool |
US11569582B2 (en) * | 2019-07-02 | 2023-01-31 | Stanley Black & Decker Mea Fze | Slot antenna in a RFID storage |
Also Published As
Publication number | Publication date |
---|---|
US7669765B2 (en) | 2010-03-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7669765B2 (en) | RFID switching | |
US7753272B2 (en) | Object tracking in an enclosure | |
US7859417B2 (en) | Object tracking in an enclosure | |
US20090072029A1 (en) | Inventory control system | |
TWI749263B (en) | Automated calibration monitoring system and method for monitoring of tool calibration status in automated tool control systems | |
CA3015812C (en) | Mobile storage, tracking and security system and method thereof | |
US20180223565A1 (en) | Self-Locking Door and Product Dispensing Enclosure Having a Self-Locking Door | |
US10614413B2 (en) | Inventory management system and method of use | |
JP5040381B2 (en) | Entrance / exit management device | |
US7965190B2 (en) | Object tracking system with automated system control and user identification | |
CN100592104C (en) | Wireless monitoring device | |
US9230380B2 (en) | Lockable enclosure having improved access system | |
US20070296545A1 (en) | System for management of ubiquitously deployed intelligent locks | |
US20030102970A1 (en) | Tool or implement storage system using wireless devices to facilitate tool control | |
US20060132304A1 (en) | Rule-based management of objects | |
CN102169547A (en) | Object intelligent monitoring system based on RFID (Radio Frequency Identification) | |
CN109750937A (en) | A kind of bank tail-box is safe to store handover equipment and handover method | |
JP2017538640A5 (en) | ||
JP2022539192A (en) | Management of objects with assigned status in automated tool management systems | |
US20030014779A1 (en) | Control of equipment using credentials | |
CN207583175U (en) | Storage joins equipment to a kind of bank tail-box safely | |
CN108961546A (en) | A kind of method and Intelligent cargo cabinet preventing wrong list | |
US20220067635A1 (en) | Inventory tracking systems and methods | |
JP2005301331A (en) | Article management system | |
JP2008127869A (en) | Electric lock system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: WINWARE, INC.,GEORGIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:HARPER, LAWRENCE EDWARD;DENISE, DERRY THOMAS;SIGNING DATES FROM 20070205 TO 20070208;REEL/FRAME:018869/0413 Owner name: WINWARE, INC., GEORGIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:HARPER, LAWRENCE EDWARD;DENISE, DERRY THOMAS;REEL/FRAME:018869/0413;SIGNING DATES FROM 20070205 TO 20070208 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
FEPP | Fee payment procedure |
Free format text: PAT HOLDER NO LONGER CLAIMS SMALL ENTITY STATUS, ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: STOL); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
AS | Assignment |
Owner name: CRIBMASTER, INC., GEORGIA Free format text: CHANGE OF NAME;ASSIGNOR:WINWARE, INC.;REEL/FRAME:030600/0031 Effective date: 20120504 |
|
SULP | Surcharge for late payment | ||
AS | Assignment |
Owner name: CRIBLIST, INC., CONNECTICUT Free format text: MERGER AND CHANGE OF NAME;ASSIGNORS:CRIBMASTER, INC.;CRIBLIST, INC.;REEL/FRAME:033515/0094 Effective date: 20131219 |
|
AS | Assignment |
Owner name: STANLEY INDUSTRIAL & AUTOMOTIVE, LLC, OHIO Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:CRIBLIST, INC.;REEL/FRAME:033658/0423 Effective date: 20131228 |
|
FPAY | Fee payment |
Year of fee payment: 8 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 12TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1553); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 12 |